Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 671:

    A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication and the files the user is sending using only a user ID and a key pair. Which of the following methods would achieve this goal?

    A. AES

    B. IPSec

    C. PGP

    D. SSH

  • Question 672:

    A company administrator has a firewall with an outside interface connected to the Internet and an inside interface connected to the corporate network. Which of the following should the administrator configure to redirect traffic destined for the default HTTP port on the outside interface to an internal server listening on port 8080?

    A. Create a dynamic PAT from port 80 on the outside interface to the internal interface on port 8080

    B. Create a dynamic NAT from port 8080 on the outside interface to the server IP address on port 80

    C. Create a static PAT from port 80 on the outside interface to the internal interface on port 8080

    D. Create a static PAT from port 8080 on the outside interface to the server IP address on port 80

  • Question 673:

    A security administrator at a company which implements key escrow and symmetric encryption only, needs to decrypt an employee's file. The employee refuses to provide the decryption key to the file. Which of the following can the administrator do to decrypt the file?

    A. Use the employee's private key

    B. Use the CA private key

    C. Retrieve the encryption key

    D. Use the recovery agent

  • Question 674:

    A security administrator must implement a secure key exchange protocol that will allow company clients to autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the following MUST be implemented?

    A. SHA-256

    B. AES

    C. Diffie-Hellman

    D. 3DES

  • Question 675:

    The Chief Executive Officer (CEO) receives a suspicious voice mail warning of credit card fraud. No one else received the voice mail. Which of the following BEST describes this attack?

    A. Whaling

    B. Vishing

    C. Spear phishing

    D. Impersonation

  • Question 676:

    RC4 is a strong encryption protocol that is generally used with which of the following?

    A. WPA2 CCMP

    B. PEAP

    C. WEP

    D. EAP-TLS

  • Question 677:

    A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need access to sales. Which of the following should be implemented to give the appropriate access while enforcing least privilege?

    A. Assign individual permissions to users 1 and 2 for payroll. Assign individual permissions to users 4 and 5 for sales. Make user 3 an administrator.

    B. Make all users administrators and then restrict users 1 and 2 from sales. Then restrict users 4 and 5 from payroll.

    C. Create two additional generic accounts, one for payroll and one for sales that users utilize.

    D. Create a sales group with users 3, 4 and 5. Create a payroll group with users 1, 2 and 3.

  • Question 678:

    A Windows-based computer is infected with malware and is running too slowly to boot and run a malware scanner. Which of the following is the BEST way to run the malware scanner?

    A. Kill all system processes

    B. Enable the firewall

    C. Boot from CD/USB

    D. Disable the network connection

  • Question 679:

    Which of the following devices is used for the transparent security inspection of network traffic by redirecting user packets prior to sending the packets to the intended destination?

    A. Proxies

    B. Load balancers

    C. Protocol analyzer

    D. VPN concentrator

  • Question 680:

    An administrator is investigating a system that may potentially be compromised, and sees the following log entries on the router.

    *Jul 15 14:47:29.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5 (6667), 3 packets.

    *Jul 15 14:47:38.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5 (6667), 6 packets.

    *Jul 15 14:47:45.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) -> 10.10.1.5 (6667), 8 packets.

    Which of the following BEST describes the compromised system?

    A. It is running a rogue web server

    B. It is being used in a man-in-the-middle attack

    C. It is participating in a botnet

    D. It is an ARP poisoning attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.