Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 811:

    A company has two server administrators that work overnight to apply patches to minimize disruption to the company. With the limited working staff, a security engineer performs a risk assessment to ensure the protection controls are in place

    to monitor all assets including the administrators in case of an emergency.

    Which of the following should be in place?

    A. NIDS

    B. CCTV

    C. Firewall

    D. NIPS

  • Question 812:

    A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication works fine, but VLAN 12 does not. Which of the following MUST happen before the server can communicate on VLAN 12?

    A. The server's network switch port must be enabled for 802.11x on VLAN 12.

    B. The server's network switch port must use VLAN Q-in-Q for VLAN 12.

    C. The server's network switch port must be 802.1q untagged for VLAN 12.

    D. The server's network switch port must be 802.1q tagged for VLAN 12.

  • Question 813:

    A security administrator is tackling issues related to authenticating users at a remote site. There have been a large number of security incidents that resulted from either tailgating or impersonation of authorized users with valid credentials. The security administrator has been told to implement multifactor authentication in order to control facility access. To secure access to the remote facility, which of the following could be implemented without increasing the amount of space required at the entrance?

    A. MOTD challenge and PIN pad

    B. Retina scanner and fingerprint reader

    C. Voice recognition and one-time PIN token

    D. One-time PIN token and proximity reader

  • Question 814:

    A company has recently allowed employees to take advantage of BYOD by installing WAPs throughout the corporate office. An employee, Joe, has recently begun to view inappropriate material at work using his personal laptop. When confronted, Joe indicated that he was never told that he could not view that type of material on his personal laptop. Which of the following should the company have employees acknowledge before allowing them to access the corporate WLAN with their personal devices?

    A. Privacy Policy

    B. Security Policy

    C. Consent to Monitoring Policy

    D. Acceptable Use Policy

  • Question 815:

    Protecting the confidentiality of a message is accomplished by encrypting the message with which of the following?

    A. Sender's private key

    B. Recipient's public key

    C. Sender's public key

    D. Recipient's private key

  • Question 816:

    An organization is implementing a password management application which requires that all local administrator passwords be stored and automatically managed. Auditors will be responsible for monitoring activities in the application by reviewing the logs. Which of the following security controls is the BEST option to prevent auditors from accessing or modifying passwords in the application?

    A. Time of day restrictions

    B. Create user accounts for the auditors and assign read-only access

    C. Mandatory access control

    D. Role-based access with read-only

  • Question 817:

    A company executive's laptop was compromised, leading to a security breach. The laptop was placed into storage by a junior system administrator and was subsequently wiped and re-imaged. When it was determined that the authorities would need to be involved, there was little evidence to present to the investigators. Which of the following procedures could have been implemented to aid the authorities in their investigation?

    A. A comparison should have been created from the original system's file hashes

    B. Witness testimony should have been taken by the administrator

    C. The company should have established a chain of custody tracking the laptop

    D. A system image should have been created and stored

  • Question 818:

    A retail store uses a wireless network for its employees to access inventory from anywhere in the store. Due to concerns regarding the aging wireless network, the store manager has brought in a consultant to harden the network. During the site survey, the consultant discovers that the network was using WEP encryption. Which of the following would be the BEST course of action for the consultant to recommend?

    A. Replace the unidirectional antenna at the front of the store with an omni-directional antenna.

    B. Change the encryption used so that the encryption protocol is CCMP-based.

    C. Disable the network's SSID and configure the router to only access store devices based on MAC addresses.

    D. Increase the access point's encryption from WEP to WPA TKIP.

  • Question 819:

    A system administrator wants to confidentially send a user name and password list to an individual outside the company without the information being detected by security controls. Which of the following would BEST meet this security goal?

    A. Digital signatures

    B. Hashing

    C. Full-disk encryption

    D. Steganography

  • Question 820:

    Several departments in a corporation have a critical need for routinely moving data from one system to another using removable storage devices. Senior management is concerned with data loss and the introduction of malware on the network. Which of the following choices BEST mitigates the range of risks associated with the continued use of removable storage devices?

    A. Remote wiping enabled for all removable storage devices

    B. Full-disk encryption enabled for all removable storage devices

    C. A well defined acceptable use policy

    D. A policy which details controls on removable storage use

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.