Exam Code: JK0-022 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Academic/E2C Security+ Certification Exam Voucher Only
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass JK0-022 Exam.
2016 May JK0-022 Study Guide Questions:
Q121. Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?
B. Data encryption
C. Password strength
Q122. Identifying residual risk is MOST important to which of the following concepts?
A. Risk deterrence
B. Risk acceptance
C. Risk mitigation
D. Risk avoidance
Q123. An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire?
A. Install a proxy server between the users’ computers and the switch to filter inbound network traffic.
B. Block commonly used ports and forward them to higher and unused port numbers.
C. Configure the switch to allow only traffic from computers based upon their physical address.
D. Install host-based intrusion detection software to monitor incoming DHCP Discover requests.
Up to the immediate present comptia jk0-022:
Q124. Which of the following should an administrator implement to research current attack methodologies?
A. Design reviews
C. Vulnerability scanner
D. Code reviews
Q125. A security technician has been asked to recommend an authentication mechanism that will allow users to authenticate using a password that will only be valid for a predefined time interval. Which of the following should the security technician recommend?
Q126. A network administrator is asked to send a large file containing PII to a business associate.
Which of the following protocols is the BEST choice to use?
High quality jk0-022 vs sy0-401:
Q127. When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength?
Q128. A server dedicated to the storage and processing of sensitive information was compromised with a rootkit and sensitive data was exfiltrated. Which of the following incident response procedures is best suited to restore the server?
A. Wipe the storage, reinstall the OS from original media and restore the data from the last known good backup.
B. Keep the data partition, restore the OS from the most current backup and run a full system antivirus scan.
C. Format the storage and reinstall both the OS and the data from the most current backup.
D. Erase the storage, reinstall the OS from most current backup and only restore the data that was not compromised.
Q129. Which of the following means of wireless authentication is easily vulnerable to spoofing?
A. MAC Filtering
B. WPA - LEAP
C. WPA - PEAP
D. Enabled SSID
Q130. Which of the following network design elements allows for many internal devices to share one public IP address?
see more JK0-022 dumps