Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 341:

    Which of the following would a security administrator use to verify the integrity of a file?

    A. Time stamp

    B. MAC times

    C. File descriptor

    D. Hash

  • Question 342:

    An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer- to-peer network that cannot connect to the Internet. The ISSO can update the antivirus definitions manually, but which of the following steps is MOST important?

    A. A full scan must be run on the network after the DAT file is installed.

    B. The signatures must have a hash value equal to what is displayed on the vendor site.

    C. The definition file must be updated within seven days.

    D. All users must be logged off of the network prior to the installation of the definition file.

  • Question 343:

    The security administrator is implementing a malware storage system to archive all malware seen by the company into a central database. The malware must be categorized and stored based on similarities in the code. Which of the following should the security administrator use to identify similar malware?

    A. TwoFish

    B. SHA-512

    C. Fuzzy hashes

    D. HMAC

  • Question 344:

    Which of the following concepts describes the use of a one way transformation in order to validate the integrity of a program?

    A. Hashing

    B. Key escrow

    C. Non-repudiation

    D. Steganography

  • Question 345:

    A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to each password before the password is hashed. This technique is known as:

    A. Symmetric cryptography.

    B. Private key cryptography.

    C. Salting.

    D. Rainbow tables.

  • Question 346:

    Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

    A. Hashing

    B. Stream ciphers

    C. Steganography

    D. Block ciphers

  • Question 347:

    A security analyst has been notified that trade secrets are being leaked from one of the executives in the corporation. When reviewing this executive's laptop they notice several pictures of the employee's pets are on the hard drive and on a cloud storage network. When the analyst hashes the images on the hard drive against the hashes on the cloud network they do not match.

    Which of the following describes how the employee is leaking these secrets?

    A. Social engineering

    B. Steganography

    C. Hashing

    D. Digital signatures

  • Question 348:

    A security audit identifies a number of large email messages being sent by a specific user from their company email account to another address external to the company. These messages were sent prior to a company data breach, which prompted the security audit. The user was one of a few people who had access to the leaked data. Review of the suspect's emails show they consist mostly of pictures of the user at various locations during a recent vacation. No suspicious activities from other users who have access to the data were discovered.

    Which of the following is occurring?

    A. The user is encrypting the data in the outgoing messages.

    B. The user is using steganography.

    C. The user is spamming to obfuscate the activity.

    D. The user is using hashing to embed data in the emails.

  • Question 349:

    After recovering from a data breach in which customer data was lost, the legal team meets with the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data.

    Which of the following controls support this goal?

    A. Contingency planning

    B. Encryption and stronger access control

    C. Hashing and non-repudiation

    D. Redundancy and fault tolerance

  • Question 350:

    Several departments within a company have a business need to send high volumes of confidential information to customers via email. Which of the following is the BEST solution to mitigate unintentional exposure of confidential information?

    A. Employ encryption on all outbound emails containing confidential information.

    B. Employ exact data matching and prevent inbound emails with Data Loss Prevention.

    C. Employ hashing on all outbound emails containing confidential information.

    D. Employ exact data matching and encrypt inbound e-mails with Data Loss Prevention.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.