Pass4itsure > CompTIA > CompTIA Security+ > JK0-022 > JK0-022 Online Practice Questions and Answers

JK0-022 Online Practice Questions and Answers

Questions 4

Pete, a security administrator, has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?

A. NIPS

B. HIDS

C. HIPS

D. NIDS

Buy Now
Questions 5

Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile device?

A. Block cipher

B. Elliptical curve cryptography

C. Diffie-Hellman algorithm

D. Stream cipher

Buy Now
Questions 6

Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a certificate?

A. Certification authority

B. Key escrow

C. Certificate revocation list

D. Registration authority

Buy Now
Questions 7

RADIUS provides which of the following?

A. Authentication, Authorization, Availability

B. Authentication, Authorization, Auditing

C. Authentication, Accounting, Auditing

D. Authentication, Authorization, Accounting

Buy Now
Questions 8

A password history value of three means which of the following?

A. Three different passwords are used before one can be reused.

B. A password cannot be reused once changed for three years.

C. After three hours a password must be re-entered to continue.

D. The server stores passwords in the database for three days.

Buy Now
Questions 9

A user has received an email from an external source which asks for details on the company's new product line set for release in one month. The user has a detailed spec sheet but it is marked "Internal Proprietary Information". Which of the following should the user do NEXT?

A. Contact their manager and request guidance on how to best move forward

B. Contact the help desk and/or incident response team to determine next steps

C. Provide the requestor with the email information since it will be released soon anyway

D. Reply back to the requestor to gain their contact information and call them

Buy Now
Questions 10

After recovering from a data breach in which customer data was lost, the legal team meets with the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data.

Which of the following controls support this goal?

A. Contingency planning

B. Encryption and stronger access control

C. Hashing and non-repudiation

D. Redundancy and fault tolerance

Buy Now
Questions 11

Methods to test the responses of software and web applications to unusual or unexpected inputs are known as:

A. Brute force.

B. HTML encoding.

C. Web crawling.

D. Fuzzing.

Buy Now
Questions 12

Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this goal?

A. A host-based intrusion prevention system

B. A host-based firewall

C. Antivirus update system

D. A network-based intrusion detection system

Buy Now
Questions 13

An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized while the computer is in use. Which of the following can be implemented?

A. Cluster tip wiping

B. Individual file encryption

C. Full disk encryption

D. Storage retention

Buy Now
Exam Code: JK0-022
Exam Name: CompTIA Security+ Certification
Last Update: May 03, 2024
Questions: 1149
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99