[Up to the immediate present] jk0-022 comptia academic/e2c security+

Exam Code: JK0-022 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Academic/E2C Security+ Certification Exam Voucher Only
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass JK0-022 Exam.

2016 May JK0-022 Study Guide Questions:

Q71. Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway? 

A. Wireless jamming 

B. Evil twin 

C. Rogue AP 

D. Packet sniffing 

Answer: A 


Q72. A merchant acquirer has the need to store credit card numbers in a transactional database in a high performance environment. Which of the following BEST protects the credit card data? 

A. Database field encryption 

B. File-level encryption 

C. Data loss prevention system 

D. Full disk encryption 

Answer: A 


Q73. LDAP and Kerberos are commonly used for which of the following? 

A. To perform queries on a directory service 

B. To store usernames and passwords for Federated Identity 

C. To sign SSL wildcard certificates for subdomains 

D. To utilize single sign-on capabilities 

Answer: D 


JK0-022  exam answers

Leading jk0-022 vce:

Q74. A small company can only afford to buy an all-in-one wireless router/switch. The company has 3 wireless BYOD users and 2 web servers without wireless access. Which of the following should the company configure to protect the servers from the user devices? (Select TWO). 

A. Deny incoming connections to the outside router interface. 

B. Change the default HTTP port 

C. Implement EAP-TLS to establish mutual authentication 

D. Disable the physical switch ports 

E. Create a server VLAN 

F. Create an ACL to access the server 

Answer: E,F 


Q75. A datacenter requires that staff be able to identify whether or not items have been removed from the facility. Which of the following controls will allow the organization to provide automated notification of item removal? 

A. CCTV 

B. Environmental monitoring 

C. RFID 

D. EMI shielding 

Answer: C 


Q76. Ann has read and write access to an employee database, while Joe has only read access. Ann is leaving for a conference. Which of the following types of authorization could be utilized to trigger write access for Joe when Ann is absent? 

A. Mandatory access control 

B. Role-based access control 

C. Discretionary access control 

D. Rule-based access control 

Answer: D 


JK0-022  exam answers

Verified jk0-022 vce:

Q77. A security audit identifies a number of large email messages being sent by a specific user from their company email account to another address external to the company. These messages were sent prior to a company data breach, which prompted the security audit. The user was one of a few people who had access to the leaked data. Review of the suspect’s emails show they consist mostly of pictures of the user at various locations during a recent vacation. No suspicious activities from other users who have access to the data were discovered. 

Which of the following is occurring? 

A. The user is encrypting the data in the outgoing messages. 

B. The user is using steganography. 

C. The user is spamming to obfuscate the activity. 

D. The user is using hashing to embed data in the emails. 

Answer: B 


Q78. The security administrator is currently unaware of an incident that occurred a week ago. Which of the following will ensure the administrator is notified in a timely manner in the future? 

A. User permissions reviews 

B. Incident response team 

C. Change management 

D. Routine auditing 

Answer: D 


Q79. A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents. Which of the following would be the BEST technology control to use in this scenario? 

A. Content filtering 

B. IDS 

C. Audit logs 

D. DLP 

Answer: D 


Q80. A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen? 

A. Application control 

B. Remote wiping 

C. GPS 

D. Screen-locks 

Answer: B 



see more JK0-022 dumps