Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 471:

    The helpdesk reports increased calls from clients reporting spikes in malware infections on their systems. Which of the following phases of incident response is MOST appropriate as a FIRST response?

    A. Recovery

    B. Follow-up

    C. Validation

    D. Identification

    E. Eradication

    F. Containment

  • Question 472:

    The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and Standard Operating Procedures documentation in order to successfully respond to future incidents. Which of the following stages of the Incident Handling process is the team working on?

    A. Lessons Learned

    B. Eradication

    C. Recovery

    D. Preparation

  • Question 473:

    During which of the following phases of the Incident Response process should a security administrator define and implement general defense against malware?

    A. Lessons Learned

    B. Preparation

    C. Eradication

    D. Identification

  • Question 474:

    Which of the following is the MOST important step for preserving evidence during forensic procedures?

    A. Involve law enforcement

    B. Chain of custody

    C. Record the time of the incident

    D. Report within one hour of discovery

  • Question 475:

    The security manager received a report that an employee was involved in illegal activity and has saved data to a workstation's hard drive. During the investigation, local law enforcement's criminal division confiscates the hard drive as evidence. Which of the following forensic procedures is involved?

    A. Chain of custody

    B. System image

    C. Take hashes

    D. Order of volatility

  • Question 476:

    A compromised workstation utilized in a Distributed Denial of Service (DDOS) attack has been removed from the network and an image of the hard drive has been created. However, the system administrator stated that the system was left unattended for several hours before the image was created. In the event of a court case, which of the following is likely to be an issue with this incident?

    A. Eye Witness

    B. Data Analysis of the hard drive

    C. Chain of custody

    D. Expert Witness

  • Question 477:

    Computer evidence at a crime scene is documented with a tag stating who had possession of the evidence at a given time.

    Which of the following does this illustrate?

    A. System image capture

    B. Record time offset

    C. Order of volatility

    D. Chain of custody

  • Question 478:

    A recent intrusion has resulted in the need to perform incident response procedures. The incident response team has identified audit logs throughout the network and organizational systems which hold details of the security breach. Prior to this incident, a security consultant informed the company that they needed to implement an NTP server on the network. Which of the following is a problem that the incident response team will likely encounter during their assessment?

    A. Chain of custody

    B. Tracking man hours

    C. Record time offset

    D. Capture video traffic

  • Question 479:

    A system administrator is responding to a legal order to turn over all logs from all company servers. The system administrator records the system time of all servers to ensure that:

    A. HDD hashes are accurate.

    B. the NTP server works properly.

    C. chain of custody is preserved.

    D. time offset can be calculated.

  • Question 480:

    The incident response team has received the following email message.

    From: [email protected] To: [email protected] Subject: Copyright infringement

    A copyright infringement alert was triggered by IP address 13.10.66.5 at 09: 50: 01 GMT. After reviewing the following web logs for IP 13.10.66.5, the team is unable to correlate and identify the incident.

    09:

    45: 33 13.10.66.5 http: //remote.site.com/login.asp?user=john

    09:

    50: 22 13.10.66.5 http: //remote.site.com/logout.asp?user=anne

    10: 50: 01 13.10.66.5 http: //remote.site.com/access.asp?file=movie.mov

    11: 02: 45 13.10.65.5 http: //remote.site.com/download.asp?movie.mov=ok

    Which of the following is the MOST likely reason why the incident response team is unable to identify and correlate the incident?

    A. The logs are corrupt and no longer forensically sound.

    B. Traffic logs for the incident are unavailable.

    C. Chain of custody was not properly maintained.

    D. Incident time offsets were not accounted for.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.