Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :May 15, 2024

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 61:

    Which of the following file systems is from Microsoft and was included with their earliest operating systems?

    A. NTFS

    B. UFS

    C. MTFS

    D. FAT

  • Question 62:

    Which of the following can be performed when an element of the company policy cannot be enforced by technical means?

    A. Develop a set of standards

    B. Separation of duties

    C. Develop a privacy policy

    D. User training

  • Question 63:

    If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing?

    A. Transitive trust

    B. Public key trust

    C. Certificate authority trust

    D. Domain level trust

  • Question 64:

    Which of the following would prevent a user from installing a program on a company-owned mobile device?

    A. White-listing

    B. Access control lists

    C. Geotagging

    D. Remote wipe

  • Question 65:

    The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity.

    Which of the following would be MOST effective for preventing this behavior?

    A. Acceptable use policies

    B. Host-based firewalls

    C. Content inspection

    D. Application whitelisting

  • Question 66:

    Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture on a popular social media site together with the message: "Heading to our two weeks vacation to Italy." Upon returning home, Joe discovers that the house was burglarized. Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe's home address?

    A. Joe has enabled the device access control feature on his mobile phone.

    B. Joe's home address can be easily found using the TRACEROUTE command.

    C. The picture uploaded to the social media site was geo-tagged by the mobile phone.

    D. The message posted on the social media site informs everyone the house will be empty.

  • Question 67:

    A company has purchased an application that integrates into their enterprise user directory for account authentication. Users are still prompted to type in their usernames and passwords. Which of the following types of authentication is being utilized here?

    A. Separation of duties

    B. Least privilege

    C. Same sign-on

    D. Single sign-on

  • Question 68:

    Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).

    A. Disable the USB root hub within the OS.

    B. Install anti-virus software on the USB drives.

    C. Disable USB within the workstations BIOS.

    D. Apply the concept of least privilege to USB devices.

    E. Run spyware detection against all workstations.

  • Question 69:

    The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client has been victimized by social engineering attacks which led to a loss of sensitive data. The security administrator advises the marketing department not to distribute the USB pens due to which of the following?

    A. The risks associated with the large capacity of USB drives and their concealable nature

    B. The security costs associated with securing the USB drives over time

    C. The cost associated with distributing a large volume of the USB pens

    D. The security risks associated with combining USB drives and cell phones on a network

  • Question 70:

    Allowing unauthorized removable devices to connect to computers increases the risk of which of the following?

    A. Data leakage prevention

    B. Data exfiltration

    C. Data classification

    D. Data deduplication

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.