Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 221:

    Which of the following application attacks is used against a corporate directory service where there are unknown servers on the network?

    A. Rogue access point

    B. Zero day attack

    C. Packet sniffing

    D. LDAP injection

  • Question 222:

    An attacker attempted to compromise a web form by inserting the following input into the username field: admin)(|(password=*)) Which of the following types of attacks was attempted?

    A. SQL injection

    B. Cross-site scripting

    C. Command injection

    D. LDAP injection

  • Question 223:

    Which of the following BEST describes a SQL Injection attack?

    A. The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.

    B. The attacker attempts to have the receiving server run a payload using programming commonly found on web servers.

    C. The attacker overwhelms a system or application, causing it to crash and bring the server down to cause an outage.

    D. The attacker overwhelms a system or application, causing it to crash, and then redirects the memory address to read from a location holding the payload.

  • Question 224:

    Highly sensitive data is stored in a database and is accessed by an application on a DMZ server. The disk drives on all servers are fully encrypted. Communication between the application server and end-users is also encrypted. Network ACLs prevent any connections to the database server except from the application server. Which of the following can still result in exposure of the sensitive data in the database server?

    A. SQL Injection

    B. Theft of the physical database server

    C. Cookies

    D. Cross-site scripting

  • Question 225:

    When an order was submitted via the corporate website, an administrator noted special characters (e.g., ";--" and "or 1=1 --") were input instead of the expected letters and numbers.

    Which of the following is the MOST likely reason for the unusual results?

    A. The user is attempting to highjack the web server session using an open-source browser.

    B. The user has been compromised by a cross-site scripting attack (XSS) and is part of a botnet performing DDoS attacks.

    C. The user is attempting to fuzz the web server by entering foreign language characters which are incompatible with the website.

    D. The user is sending malicious SQL injection strings in order to extract sensitive company or customer data via the website.

  • Question 226:

    The string:

    ` or 1=1--

    Represents which of the following?

    A. Bluejacking

    B. Rogue access point

    C. SQL Injection

    D. Client-side attacks

  • Question 227:

    Which of the following types of application attacks would be used to specifically gain unauthorized information from databases that did not have any input validation implemented?

    A. SQL injection

    B. Session hijacking and XML injection

    C. Cookies and attachments

    D. Buffer overflow and XSS

  • Question 228:

    A security administrator looking through IDS logs notices the following entry: (where [email protected] and passwd= `or 1==1')

    Which of the following attacks had the administrator discovered?

    A. SQL injection

    B. XML injection

    C. Cross-site script

    D. Header manipulation

  • Question 229:

    Which of the following BEST describes a protective countermeasure for SQL injection?

    A. Eliminating cross-site scripting vulnerabilities

    B. Installing an IDS to monitor network traffic

    C. Validating user input in web applications

    D. Placing a firewall between the Internet and database servers

  • Question 230:

    Pete, the security administrator, has been notified by the IDS that the company website is under attack. Analysis of the web logs show the following string, indicating a user is trying to post a comment on the public bulletin board.

    INSERT INTO message `

    This is an example of which of the following?

    A. XSS attack

    B. XML injection attack

    C. Buffer overflow attack

    D. SQL injection attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.