Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 461:

    Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST level of security training for the executives? (Select TWO).

    A. Acceptable use of social media

    B. Data handling and disposal

    C. Zero day exploits and viruses

    D. Phishing threats and attacks

    E. Clean desk and BYOD

    F. Information security awareness

  • Question 462:

    Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?

    A. Acceptable Use Policy

    B. Physical security controls

    C. Technical controls

    D. Security awareness training

  • Question 463:

    After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation?

    A. Information Security Awareness

    B. Social Media and BYOD

    C. Data Handling and Disposal

    D. Acceptable Use of IT Systems

  • Question 464:

    The security officer is preparing a read-only USB stick with a document of important personal phone numbers, vendor contacts, an MD5 program, and other tools to provide to employees. At which of the following points in an incident should the officer instruct employees to use this information?

    A. Business Impact Analysis

    B. First Responder

    C. Damage and Loss Control

    D. Contingency Planning

  • Question 465:

    Which of the following is the LEAST volatile when performing incident response procedures?

    A. Registers

    B. RAID cache

    C. RAM

    D. Hard drive

  • Question 466:

    In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager. Which of the following incident response procedures would he need to perform in order to begin the analysis? (Select TWO).

    A. Take hashes

    B. Begin the chain of custody paperwork

    C. Take screen shots

    D. Capture the system image

    E. Decompile suspicious files

  • Question 467:

    A server dedicated to the storage and processing of sensitive information was compromised with a rootkit and sensitive data was extracted. Which of the following incident response procedures is best suited to restore the server?

    A. Wipe the storage, reinstall the OS from original media and restore the data from the last known good backup.

    B. Keep the data partition, restore the OS from the most current backup and run a full system antivirus scan.

    C. Format the storage and reinstall both the OS and the data from the most current backup.

    D. Erase the storage, reinstall the OS from most current backup and only restore the data that was not compromised.

  • Question 468:

    After a recent security breach, the network administrator has been tasked to update and backup all router and switch configurations. The security administrator has been tasked to enforce stricter security policies. All users were forced to undergo additional user awareness training. All of these actions are due to which of the following types of risk mitigation strategies?

    A. Change management

    B. Implementing policies to prevent data loss

    C. User rights and permissions review

    D. Lessons learned

  • Question 469:

    In which of the following steps of incident response does a team analyse the incident and determine steps to prevent a future occurrence?

    A. Mitigation

    B. Identification

    C. Preparation

    D. Lessons learned

  • Question 470:

    Who should be contacted FIRST in the event of a security breach?

    A. Forensics analysis team

    B. Internal auditors

    C. Incident response team

    D. Software vendors

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.