Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 191:

    An administrator notices that former temporary employees' accounts are still active on a domain. Which of the following can be implemented to increase security and prevent this from happening?

    A. Implement a password expiration policy.

    B. Implement an account expiration date for permanent employees.

    C. Implement time of day restrictions for all temporary employees.

    D. Run a last logon script to look for inactive accounts.

  • Question 192:

    An auditor's report discovered several accounts with no activity for over 60 days. The accounts were later identified as contractors' accounts who would be returning in three months and would need to resume the activities. Which of the following would mitigate and secure the auditors finding?

    A. Disable unnecessary contractor accounts and inform the auditor of the update.

    B. Reset contractor accounts and inform the auditor of the update.

    C. Inform the auditor that the accounts belong to the contractors.

    D. Delete contractor accounts and inform the auditor of the update.

  • Question 193:

    The Chief Technology Officer (CTO) wants to improve security surrounding storage of customer passwords.

    The company currently stores passwords as SHA hashes. Which of the following can the CTO implement requiring the LEAST change to existing systems?

    A. Smart cards

    B. TOTP

    C. Key stretching

    D. Asymmetric keys

  • Question 194:

    Joe analyzed the following log and determined the security team should implement which of the following as a mitigation method against further attempts?

    Host 192.168.1.123

    [00:

    00: 01]Successful Login: 015 192.168.1.123 : local

    [00:

    00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124

    [00:

    00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124

    [00:

    00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124

    [00:

    00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124

    A.

    Reporting

    B.

    IDS

    C.

    Monitor system logs

    D.

    Hardening

  • Question 195:

    A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389 are in a `listening' state. No other ports are open. Which of the following services should be disabled to ensure secure communications?

    A. HTTPS

    B. HTTP

    C. RDP

    D. TELNET

  • Question 196:

    During a routine audit a web server is flagged for allowing the use of weak ciphers. Which of the following should be disabled to mitigate this risk? (Select TWO).

    A. SSL 1.0

    B. RC4

    C. SSL 3.0

    D. AES

    E. DES

    F. TLS 1.0

  • Question 197:

    A vulnerability assessment indicates that a router can be accessed from default port 80 and default port 22. Which of the following should be executed on the router to prevent access via these ports? (Select TWO).

    A. FTP service should be disabled

    B. HTTPS service should be disabled

    C. SSH service should be disabled

    D. HTTP service should disabled

    E. Telnet service should be disabled

  • Question 198:

    A security technician is attempting to improve the overall security posture of an internal mail server. Which of the following actions would BEST accomplish this goal?

    A. Monitoring event logs daily

    B. Disabling unnecessary services

    C. Deploying a content filter on the network

    D. Deploy an IDS on the network

  • Question 199:

    The security administrator is analyzing a user's history file on a Unix server to determine if the user was attempting to break out of a rootjail. Which of the following lines in the user's history log shows evidence that the user attempted to escape the rootjail?

    A. cd ../../../../bin/bash

    B. whoami

    C. ls /root

    D. sudo -u root

  • Question 200:

    A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?

    A. Firewall

    B. Application

    C. IDS

    D. Security

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.