Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :May 06, 2024

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 41:

    Identifying a list of all approved software on a system is a step in which of the following practices?

    A. Passively testing security controls

    B. Application hardening

    C. Host software baselining

    D. Client-side targeting

  • Question 42:

    A computer is suspected of being compromised by malware. The security analyst examines the computer and finds that a service called Telnet is running and connecting to an external website over port 443. This Telnet service was found by comparing the system's services to the list of standard services on the company's system image. This review process depends on:

    A. MAC filtering.

    B. System hardening.

    C. Rogue machine detection.

    D. Baselining.

  • Question 43:

    The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO).

    A. Device encryption

    B. Antivirus

    C. Privacy screen

    D. Cable locks

    E. Remote wipe

  • Question 44:

    Which of the following can be used as an equipment theft deterrent?

    A. Screen locks

    B. GPS tracking

    C. Cable locks

    D. Whole disk encryption

  • Question 45:

    Which of the following devices will help prevent a laptop from being removed from a certain location?

    A. Device encryption

    B. Cable locks

    C. GPS tracking

    D. Remote data wipes

  • Question 46:

    Joe, a network security engineer, has visibility to network traffic through network monitoring tools.

    However, he's concerned that a disgruntled employee may be targeting a server containing the company's financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe's suspicion?

    A. HIDS

    B. HIPS

    C. NIPS

    D. NIDS

  • Question 47:

    Which of the following MOST interferes with network-based detection techniques?

    A. Mime-encoding

    B. SSL

    C. FTP

    D. Anonymous email accounts

  • Question 48:

    Which of the following is an important step in the initial stages of deploying a host-based firewall?

    A. Selecting identification versus authentication

    B. Determining the list of exceptions

    C. Choosing an encryption algorithm

    D. Setting time of day restrictions

  • Question 49:

    Each server on a subnet is configured to only allow SSH access from the administrator's workstation. Which of the following BEST describes this implementation?

    A. Host-based firewalls

    B. Network firewalls

    C. Network proxy

    D. Host intrusion prevention

  • Question 50:

    Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this goal?

    A. A host-based intrusion prevention system

    B. A host-based firewall

    C. Antivirus update system

    D. A network-based intrusion detection system

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.