Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 1061:

    Two members of the finance department have access to sensitive information. The company is concerned they may work together to steal information. Which of the following controls could be implemented to discover if they are working together?

    A. Least privilege access

    B. Separation of duties

    C. Mandatory access control

    D. Mandatory vacations

  • Question 1062:

    Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company?

    A. Privacy Policy

    B. Least Privilege

    C. Acceptable Use

    D. Mandatory Vacations

  • Question 1063:

    Which of the following provides the BEST explanation regarding why an organization needs to implement IT security policies?

    A. To ensure that false positives are identified

    B. To ensure that staff conform to the policy

    C. To reduce the organizational risk

    D. To require acceptable usage of IT systems

  • Question 1064:

    A major security risk with co-mingling of hosts with different security requirements is:

    A. Security policy violations.

    B. Zombie attacks.

    C. Password compromises.

    D. Privilege creep.

  • Question 1065:

    Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company's password policy. Which of the following should Pete do NEXT?

    A. Contact the Chief Information Officer and ask them to change the company password policy so that the application is made compliant.

    B. Tell the application development manager to code the application to adhere to the company's password policy.

    C. Ask the application development manager to submit a risk acceptance memo so that the issue can be documented.

    D. Inform the Chief Information Officer of non-adherence to the security policy so that the developers can be reprimanded.

  • Question 1066:

    Joe, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Joe insisted that he was not aware of any company policy that prohibits the use of such web sites. Which of the following is the BEST method to deter employees from the improper use of the company's information systems?

    A. Acceptable Use Policy

    B. Privacy Policy

    C. Security Policy

    D. Human Resource Policy

  • Question 1067:

    Joe, a security analyst, asks each employee of an organization to sign a statement saying that they understand how their activities may be monitored. Which of the following BEST describes this statement? (Select TWO).

    A. Acceptable use policy

    B. Risk acceptance policy

    C. Privacy policy

    D. Email policy

    E. Security policy

  • Question 1068:

    A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?

    A. Command shell restrictions

    B. Restricted interface

    C. Warning banners

    D. Session output pipe to /dev/null

  • Question 1069:

    Which of the following is an example of a false negative?

    A. The IDS does not identify a buffer overflow.

    B. Anti-virus identifies a benign application as malware.

    C. Anti-virus protection interferes with the normal operation of an application.

    D. A user account is locked out after the user mistypes the password too many times.

  • Question 1070:

    Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for multicast packets from the switches on the network. After investigation, she discovers that this is normal activity for her network. Which of the following BEST describes these results?

    A. True negatives

    B. True positives

    C. False positives

    D. False negatives

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.