Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 531:

    Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years.

    Which of the following should Sara do to address the risk?

    A. Accept the risk saving $10,000.

    B. Ignore the risk saving $5,000.

    C. Mitigate the risk saving $10,000.

    D. Transfer the risk saving $5,000.

  • Question 532:

    Which of the following defines a business goal for system restoration and acceptable data loss?

    A. MTTR

    B. MTBF

    C. RPO

    D. Warm site

  • Question 533:

    A software company has completed a security assessment. The assessment states that the company should implement fencing and lighting around the property. Additionally, the assessment states that production releases of their software should be digitally signed. Given the recommendations, the company was deficient in which of the following core security areas? (Select TWO).

    A. Fault tolerance

    B. Encryption

    C. Availability

    D. Integrity

    E. Safety

    F. Confidentiality

  • Question 534:

    Identifying residual risk is MOST important to which of the following concepts?

    A. Risk deterrence

    B. Risk acceptance

    C. Risk mitigation

    D. Risk avoidance

  • Question 535:

    A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server's drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO? (Select TWO).

    A. Disk hashing procedures

    B. Full disk encryption

    C. Data retention policies

    D. Disk wiping procedures

    E. Removable media encryption

  • Question 536:

    An IT security manager is asked to provide the total risk to the business. Which of the following calculations would he security manager choose to determine total risk?

    A. (Threats X vulnerability X asset value) x controls gap

    B. (Threats X vulnerability X profit) x asset value

    C. Threats X vulnerability X control gap

    D. Threats X vulnerability X asset value

  • Question 537:

    Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privilege principles?

    A. User rights reviews

    B. Incident management

    C. Risk based controls

    D. Annual loss expectancy

  • Question 538:

    A security administrator notices that a specific network administrator is making unauthorized changes to the firewall every Saturday morning. Which of the following would be used to mitigate this issue so that only security administrators can make changes to the firewall?

    A. Mandatory vacations

    B. Job rotation

    C. Least privilege

    D. Time of day restrictions

  • Question 539:

    One of the system administrators at a company is assigned to maintain a secure computer lab. The administrator has rights to configure machines, install software, and perform user account maintenance. However, the administrator cannot add new computers to the domain, because that requires authorization from the Information Assurance Officer. This is an example of which of the following?

    A. Mandatory access

    B. Rule-based access control

    C. Least privilege

    D. Job rotation

  • Question 540:

    Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process?

    A. Separation of Duties

    B. Mandatory Vacations

    C. Discretionary Access Control

    D. Job Rotation

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.