[Improve] jk0-022 comptia academic/e2c security+

Exam Code: JK0-022 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Academic/E2C Security+ Certification Exam Voucher Only
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass JK0-022 Exam.

2016 May JK0-022 Study Guide Questions:

Q121. Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks? 

A. 802.1x 

B. Data encryption 

C. Password strength 

D. BGP 

Answer: A 


Q122. Identifying residual risk is MOST important to which of the following concepts? 

A. Risk deterrence 

B. Risk acceptance 

C. Risk mitigation 

D. Risk avoidance 

Answer: B 


Q123. An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire? 

A. Install a proxy server between the users’ computers and the switch to filter inbound network traffic. 

B. Block commonly used ports and forward them to higher and unused port numbers. 

C. Configure the switch to allow only traffic from computers based upon their physical address. 

D. Install host-based intrusion detection software to monitor incoming DHCP Discover requests. 

Answer: C 


JK0-022  free draindumps

Up to the immediate present comptia jk0-022:

Q124. Which of the following should an administrator implement to research current attack methodologies? 

A. Design reviews 

B. Honeypot 

C. Vulnerability scanner 

D. Code reviews 

Answer: B 


Q125. A security technician has been asked to recommend an authentication mechanism that will allow users to authenticate using a password that will only be valid for a predefined time interval. Which of the following should the security technician recommend? 

A. CHAP 

B. TOTP 

C. HOTP 

D. PAP 

Answer: B 


Q126. A network administrator is asked to send a large file containing PII to a business associate. 

Which of the following protocols is the BEST choice to use? 

A. SSH 

B. SFTP 

C. SMTP 

D. FTP 

Answer: B 


JK0-022  free draindumps

High quality jk0-022 vs sy0-401:

Q127. When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength? 

A. SHA 

B. AES 

C. DES 

D. RSA 

Answer: D 


Q128. A server dedicated to the storage and processing of sensitive information was compromised with a rootkit and sensitive data was exfiltrated. Which of the following incident response procedures is best suited to restore the server? 

A. Wipe the storage, reinstall the OS from original media and restore the data from the last known good backup. 

B. Keep the data partition, restore the OS from the most current backup and run a full system antivirus scan. 

C. Format the storage and reinstall both the OS and the data from the most current backup. 

D. Erase the storage, reinstall the OS from most current backup and only restore the data that was not compromised. 

Answer: A 


Q129. Which of the following means of wireless authentication is easily vulnerable to spoofing? 

A. MAC Filtering 

B. WPA - LEAP 

C. WPA - PEAP 

D. Enabled SSID 

Answer: A 


Q130. Which of the following network design elements allows for many internal devices to share one public IP address? 

A. DNAT 

B. PAT 

C. DNS 

D. DMZ 

Answer: B 



see more JK0-022 dumps