Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 611:

    A network administrator uses an RFID card to enter the datacenter, a key to open the server rack, and a username and password to logon to a server. These are examples of which of the following?

    A. Multifactor authentication

    B. Single factor authentication

    C. Separation of duties

    D. Identification

  • Question 612:

    Ann, the security administrator, wishes to implement multifactor security. Which of the following should be implemented in order to compliment password usage and smart cards?

    A. Hard tokens

    B. Fingerprint readers

    C. Swipe badge readers

    D. Passphrases

  • Question 613:

    A technician is reviewing the logical access control method an organization uses. One of the senior managers requests that the technician prevent staff members from logging on during nonworking days. Which of the following should the technician implement to meet managements request?

    A. Enforce Kerberos

    B. Deploy smart cards

    C. Time of day restrictions

    D. Access control lists

  • Question 614:

    Which of the following security concepts can prevent a user from logging on from home during the weekends?

    A. Time of day restrictions

    B. Multifactor authentication

    C. Implicit deny

    D. Common access card

  • Question 615:

    The company's sales team plans to work late to provide the Chief Executive Officer (CEO) with a special report of sales before the quarter ends. After working for several hours, the team finds they cannot save or print the reports.

    Which of the following controls is preventing them from completing their work?

    A. Discretionary access control

    B. Role-based access control

    C. Time of Day access control

    D. Mandatory access control

  • Question 616:

    Users require access to a certain server depending on their job function. Which of the following would be the MOST appropriate strategy for securing the server?

    A. Common access card

    B. Role based access control

    C. Discretionary access control

    D. Mandatory access control

  • Question 617:

    A company hired Joe, an accountant. The IT administrator will need to create a new account for Joe. The company uses groups for ease of management and administration of user accounts. Joe will need network access to all directories, folders and files within the accounting department.

    Which of the following configurations will meet the requirements?

    A. Create a user account and assign the user account to the accounting group.

    B. Create an account with role-based access control for accounting.

    C. Create a user account with password reset and notify Joe of the account creation.

    D. Create two accounts: a user account and an account with full network administration rights.

  • Question 618:

    During the information gathering stage of a deploying role-based access control model, which of the following information is MOST likely required?

    A. Conditional rules under which certain systems may be accessed

    B. Matrix of job titles with required access privileges

    C. Clearance levels of all company personnel

    D. Normal hours of business operation

  • Question 619:

    A security technician is working with the network firewall team to implement access controls at the company's demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond?

    A. Rule based access control

    B. Role based access control

    C. Discretionary access control D. Mandatory access control

  • Question 620:

    The IT department has setup a share point site to be used on the intranet. Security has established the groups and permissions on the site. No one may modify the permissions and all requests for access are centrally managed by the security team. This is an example of which of the following control types?

    A. Rule based access control

    B. Mandatory access control

    C. User assigned privilege

    D. Discretionary access control

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.