Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 861:

    A security administrator is auditing a database server to ensure the correct security measures are in place to protect the data. Some of the fields consist of people's first name, last name, home address, date of birth and mothers last name. Which of the following describes this type of data?

    A. PII

    B. PCI

    C. Low

    D. Public

  • Question 862:

    Which of the following should be used to authenticate and log connections from wireless users connecting with EAP-TLS?

    A. Kerberos

    B. LDAP

    C. SAML

    D. RADIUS

  • Question 863:

    Ann, a security administrator at a call center, has been experiencing problems with users intentionally installing unapproved and occasionally malicious software on their computers. Due to the nature of their jobs, Ann cannot change their permissions. Which of the following would BEST alleviate her concerns?

    A. Deploy a HIDS suite on the users' computers to prevent application installation.

    B. Maintain the baseline posture at the highest OS patch level.

    C. Enable the pop-up blockers on the users' browsers to prevent malware.

    D. Create an approved application list and block anything not on it.

  • Question 864:

    An organization must implement controls to protect the confidentiality of its most sensitive data. The company is currently using a central storage system and group based access control for its sensitive information. Which of the following controls can further secure the data in the central storage system?

    A. Data encryption

    B. Patching the system

    C. Digital signatures

    D. File hashing

  • Question 865:

    A network administrator, Joe, arrives at his new job to find that none of the users have changed their network passwords since they were initially hired. Joe wants to have everyone change their passwords immediately. Which of the following policies should be enforced to initiate a password change?

    A. Password expiration

    B. Password reuse

    C. Password recovery

    D. Password disablement

  • Question 866:

    The Chief Security Officer (CSO) is contacted by a first responder. The CSO assigns a handler. Which of the following is occurring?

    A. Unannounced audit response

    B. Incident response process

    C. Business continuity planning

    D. Unified threat management

    E. Disaster recovery process

  • Question 867:

    A company would like to take electronic orders from a partner; however, they are concerned that a non- authorized person may send an order. The legal department asks if there is a solution that provides non- repudiation. Which of the following would meet the requirements of this scenario?

    A. Encryption

    B. Digital signatures

    C. Steganography

    D. Hashing

    E. Perfect forward secrecy

  • Question 868:

    Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT group, to edit a file. Currently, the file has the following permissions:

    Ann: read/write

    Sales Group: read

    IT Group: no access

    If a discretionary access control list is in place for the files owned by Ann, which of the following would be the BEST way to share the file with Joe?

    A. Add Joe to the Sales group.

    B. Have the system administrator give Joe full access to the file.

    C. Give Joe the appropriate access to the file directly.

    D. Remove Joe from the IT group and add him to the Sales group.

  • Question 869:

    A security administrator is notified that users attached to a particular switch are having intermittent connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing attack. Which of the following could be utilized to provide protection from this type of attack?

    A. Configure MAC filtering on the switch.

    B. Configure loop protection on the switch.

    C. Configure flood guards on the switch.

    D. Configure 802.1x authentication on the switch.

  • Question 870:

    A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server that is used by several employees. Which of the following is the BEST approach for implementation of the new application on the virtual server?

    A. Take a snapshot of the virtual server after installing the new application and store the snapshot in a secure location.

    B. Generate a baseline report detailing all installed applications on the virtualized server after installing the new application.

    C. Take a snapshot of the virtual server before installing the new application and store the snapshot in a secure location.

    D. Create an exact copy of the virtual server and store the copy on an external hard drive after installing the new application.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.