Certbus > CompTIA > CompTIA Security+ > JK0-022 > JK0-022 Online Practice Questions and Answers

JK0-022 Online Practice Questions and Answers

Questions 4

While rarely enforced, mandatory vacation policies are effective at uncovering:

A. Help desk technicians with oversight by multiple supervisors and detailed quality control systems.

B. Collusion between two employees who perform the same business function.

C. Acts of incompetence by a systems engineer designing complex architectures as a member of a team.

D. Acts of gross negligence on the part of system administrators with unfettered access to system and no oversight.

Browse 1149 Q&As
Questions 5

Which of the following helps to establish an accurate timeline for a network intrusion?

A. Hashing images of compromised systems

B. Reviewing the date of the antivirus definition files

C. Analyzing network traffic and device logs

D. Enforcing DLP controls at the perimeter

Browse 1149 Q&As
Questions 6

Which of the following is true about asymmetric encryption?

A. A message encrypted with the private key can be decrypted by the same key

B. A message encrypted with the public key can be decrypted with a shared key.

C. A message encrypted with a shared key, can be decrypted by the same key.

D. A message encrypted with the public key can be decrypted with the private key.

Browse 1149 Q&As
Questions 7

A security administrator must implement a system to allow clients to securely negotiate encryption keys with the company's server over a public unencrypted communication channel.

Which of the following implements the required secure key negotiation? (Select TWO).

A. PBKDF2

B. Symmetric encryption

C. Steganography

D. ECDHE

E. Diffie-Hellman

Browse 1149 Q&As
Questions 8

Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed?

A. Bollards

B. Video surveillance

C. Proximity readers

D. Fencing

Browse 1149 Q&As
Questions 9

Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks?

A. Intrusion Detection System

B. Flood Guard Protection

C. Web Application Firewall

D. URL Content Filter

Browse 1149 Q&As
Questions 10

The Chief Information Officer (CIO) is concerned with moving an application to a SaaS cloud provider. Which of the following can be implemented to provide for data confidentiality assurance during and after the migration to the cloud?

A. HPM technology

B. Full disk encryption

C. DLP policy

D. TPM technology

Browse 1149 Q&As
Questions 11

After running into the data center with a vehicle, attackers were able to enter through the hole in the building and steal several key servers in the ensuing chaos. Which of the following security measures can be put in place to mitigate the issue from occurring in the future?

A. Fencing

B. Proximity readers

C. Video surveillance

D. Bollards

Browse 1149 Q&As
Questions 12

A company replaces a number of devices with a mobile appliance, combining several functions. Which of the following descriptions fits this new implementation? (Select TWO).

A. Cloud computing

B. Virtualization

C. All-in-one device

D. Load balancing

E. Single point of failure

Browse 1149 Q&As
Questions 13

Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

A. Hashing

B. Stream ciphers

C. Steganography

D. Block ciphers

Browse 1149 Q&As
Questions 14

Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure?

A. Hardware load balancing

B. RAID

C. A cold site

D. A host standby

Browse 1149 Q&As
Questions 15

How must user accounts for exiting employees be handled?

A. Disabled, regardless of the circumstances

B. Disabled if the employee has been terminated

C. Deleted, regardless of the circumstances

D. Deleted if the employee has been terminated

Browse 1149 Q&As
Questions 16

Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall application but does not have all the details. Jane needs to review the software before it is released to production. Which of the following reviews should Jane conduct?

A. Gray Box Testing

B. Black Box Testing

C. Business Impact Analysis

D. White Box Testing

Browse 1149 Q&As
Questions 17

A way to assure data at-rest is secure even in the event of loss or theft is to use:

A. Full device encryption.

B. Special permissions on the file system.

C. Trusted Platform Module integration.

D. Access Control Lists.

Browse 1149 Q&As
Questions 18

A security administrator has concerns regarding employees saving data on company provided mobile devices. Which of the following would BEST address the administrator's concerns?

A. Install a mobile application that tracks read and write functions on the device.

B. Create a company policy prohibiting the use of mobile devices for personal use.

C. Enable GPS functionality to track the location of the mobile devices.

D. Configure the devices so that removable media use is disabled.

Browse 1149 Q&As
Exam Code: JK0-022
Exam Name: CompTIA Security+ Certification
Last Update: Apr 10, 2024
Questions: 1149 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99