Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 521:

    Acme Corp has selectively outsourced proprietary business processes to ABC Services. Due to some technical issues, ABC services wants to send some of Acme Corp's debug data to a third party vendor for problem resolution. Which of the following MUST be considered prior to sending data to a third party?

    A. The data should be encrypted prior to transport

    B. This would not constitute unauthorized data sharing

    C. This may violate data ownership and non-disclosure agreements

    D. Acme Corp should send the data to ABC Services' vendor instead

  • Question 522:

    A security administrator plans on replacing a critical business application in five years. Recently, there was a security flaw discovered in the application that will cause the IT department to manually re-enable user accounts each month at a cost of $2,000. Patching the application today would cost $140,000 and take two months to implement. Which of the following should the security administrator do in regards to the application?

    A. Avoid the risk to the user base allowing them to re-enable their own accounts

    B. Mitigate the risk by patching the application to increase security and saving money

    C. Transfer the risk replacing the application now instead of in five years

    D. Accept the risk and continue to enable the accounts each month saving money

  • Question 523:

    Which of the following is the primary security concern when deploying a mobile device on a network?

    A. Strong authentication

    B. Interoperability

    C. Data security

    D. Cloud storage technique

  • Question 524:

    A company has decided to move large data sets to a cloud provider in order to limit the costs of new infrastructure. Some of the data is sensitive and the Chief Information Officer wants to make sure both parties have a clear understanding of the controls needed to protect the data.

    Which of the following types of interoperability agreement is this?

    A. ISA

    B. MOU

    C. SLA

    D. BPA

  • Question 525:

    Which of the following describes the purpose of an MOU?

    A. Define interoperability requirements

    B. Define data backup process

    C. Define onboard/offboard procedure

    D. Define responsibilities of each party

  • Question 526:

    Which of the following is the GREATEST security risk of two or more companies working together under a Memorandum of Understanding?

    A. Budgetary considerations may not have been written into the MOU, leaving an entity to absorb more cost than intended at signing.

    B. MOUs have strict policies in place for services performed between the entities and the penalties for compromising a partner are high.

    C. MOUs are generally loose agreements and therefore may not have strict guidelines in place to protect sensitive data between the two entities.

    D. MOUs between two companies working together cannot be held to the same legal standards as SLAs.

  • Question 527:

    Users can authenticate to a company's web applications using their credentials from a popular social media site. Which of the following poses the greatest risk with this integration?

    A. Malicious users can exploit local corporate credentials with their social media credentials

    B. Changes to passwords on the social media site can be delayed from replicating to the company

    C. Data loss from the corporate servers can create legal liabilities with the social media site

    D. Password breaches to the social media site affect the company application as well

  • Question 528:

    The system administrator notices that their application is no longer able to keep up with the large amounts of traffic their server is receiving daily. Several packets are dropped and sometimes the server is taken offline. Which of the following would be a possible solution to look into to ensure their application remains secure and available?

    A. Cloud computing

    B. Full disk encryption

    C. Data Loss Prevention

    D. HSM

  • Question 529:

    Elastic cloud computing environments often reuse the same physical hardware for multiple customers over time as virtual machines are instantiated and deleted. This has important implications for which of the following data security concerns?

    A. Hardware integrity

    B. Data confidentiality

    C. Availability of servers

    D. Integrity of data

  • Question 530:

    Which of the following concepts are included on the three sides of the "security triangle"? (Select THREE).

    A. Confidentiality

    B. Availability

    C. Integrity

    D. Authorization

    E. Authentication

    F. Continuity

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.