Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 251:

    Which of the following types of wireless attacks would be used specifically to impersonate another WAP in order to gain unauthorized information from mobile users?

    A. IV attack

    B. Evil twin

    C. War driving

    D. Rogue access point

  • Question 252:

    After a recent breach, the security administrator performs a wireless survey of the corporate network. The security administrator notices a problem with the following output: MAC SSID ENCRYPTION POWER BEACONS 00:10:A1:36:12:CC MYCORP WPA2 CCMP 60 1202 00:10:A1:49:FC:37 MYCORP WPA2 CCMP 70 9102 FB:90:11:42:FA:99 MYCORP WPA2 CCMP 40 3031 00:10:A1:AA:BB:CC MYCORP WPA2 CCMP 55 2021 00:10:A1:FA:B1:07 MYCORP WPA2 CCMP 30 6044

    Given that the corporate wireless network has been standardized, which of the following attacks is underway?

    A. Evil twin

    B. IV attack

    C. Rogue AP

    D. DDoS

  • Question 253:

    After viewing wireless traffic, an attacker notices the following networks are being broadcasted by local access points:

    Corpnet Coffeeshop FreePublicWifi

    Using this information the attacker spoofs a response to make nearby laptops connect back to a malicious device. Which of the following has the attacker created?

    A. Infrastructure as a Service

    B. Load balancer

    C. Evil twin

    D. Virtualized network

  • Question 254:

    The system administrator has been notified that many users are having difficulty connecting to the company's wireless network. They take a new laptop and physically go to the access point and connect with no problems. Which of the following would be the MOST likely cause?

    A. The certificate used to authenticate users has been compromised and revoked.

    B. Multiple war drivers in the parking lot have exhausted all available IPs from the pool to deny access.

    C. An attacker has gained access to the access point and has changed the encryption keys.

    D. An unauthorized access point has been configured to operate on the same channel.

  • Question 255:

    Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway?

    A. Wireless jamming

    B. Evil twin

    C. Rogue AP

    D. Packet sniffing

  • Question 256:

    Which of the following is where an unauthorized device is found allowing access to a network?

    A. Bluesnarfing

    B. Rogue access point

    C. Honeypot

    D. IV attack

  • Question 257:

    Ann, the network administrator, has learned from the helpdesk that employees are accessing the wireless network without entering their domain credentials upon connection. Once the connection is made, they cannot reach any internal resources, while wired network connections operate smoothly. Which of the following is MOST likely occurring?

    A. A user has plugged in a personal access point at their desk to connect to the network wirelessly.

    B. The company is currently experiencing an attack on their internal DNS servers.

    C. The company's WEP encryption has been compromised and WPA2 needs to be implemented instead.

    D. An attacker has installed an access point nearby in an attempt to capture company information.

  • Question 258:

    Users have been reporting that their wireless access point is not functioning. They state that it allows slow connections to the internet, but does not provide access to the internal network. The user provides the SSID and the technician logs into the company's access point and finds no issues. Which of the following should the technician do?

    A. Change the access point from WPA2 to WEP to determine if the encryption is too strong

    B. Clear all access logs from the AP to provide an up-to-date access list of connected users

    C. Check the MAC address of the AP to which the users are connecting to determine if it is an imposter

    D. Reconfigure the access point so that it is blocking all inbound and outbound traffic as a troubleshooting gap

  • Question 259:

    Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?

    A. Interference

    B. Man-in-the-middle

    C. ARP poisoning

    D. Rogue access point

  • Question 260:

    A computer supply company is located in a building with three wireless networks. The system security team implemented a quarterly security scan and saw the following.

    SSID State Channel Level Computer AreUs1 connected 1 70dbm Computer AreUs2 connected 5 80dbm Computer AreUs3 connected 3 75dbm Computer AreUs4 connected 6 95dbm

    Which of the following is this an example of?

    A. Rogue access point

    B. Near field communication

    C. Jamming

    D. Packet sniffing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.