Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 881:

    Ann, the network administrator, is receiving reports regarding a particular wireless network in the building. The network was implemented for specific machines issued to the developer department, but the developers are stating that they are having connection issues as well as slow bandwidth. Reviewing the wireless router's logs, she sees that devices not belonging to the developers are connecting to the access point. Which of the following would BEST alleviate the developer's reports?

    A. Configure the router so that wireless access is based upon the connecting device's hardware address.

    B. Modify the connection's encryption method so that it is using WEP instead of WPA2.

    C. Implement connections via secure tunnel with additional software on the developer's computers.

    D. Configure the router so that its name is not visible to devices scanning for wireless networks.

  • Question 882:

    Joe is the accounts payable agent for ABC Company. Joe has been performing accounts payable function for the ABC Company without any supervision. Management has noticed several new accounts without billing invoices that were paid. Which of the following is the BEST management option for review of the new accounts?

    A. Mandatory vacation

    B. Job rotation

    C. Separation of duties

    D. Replacement

  • Question 883:

    Which of the following is the BEST reason for placing a password lock on a mobile device?

    A. Prevents an unauthorized user from accessing owner's data

    B. Enables remote wipe capabilities

    C. Stops an unauthorized user from using the device again

    D. Prevents an unauthorized user from making phone calls

  • Question 884:

    When performing the daily review of the system vulnerability scans of the network Joe, the administrator, noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe researches the assigned vulnerability identification number from the vendor website. Joe proceeds with applying the recommended solution for identified vulnerability. Which of the following is the type of vulnerability described?

    A. Network based

    B. IDS

    C. Signature based

    D. Host based

  • Question 885:

    Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save money while providing valuable services. She is looking for a cost- effective solution to assist in capacity planning as well as visibility into the performance of the network. Which of the following cloud technologies should she look into?

    A. IaaS

    B. MaaS

    C. SaaS

    D. PaaS

  • Question 886:

    A recent audit has revealed weaknesses in the process of deploying new servers and network devices. Which of the following practices could be used to increase the security posture during deployment? (Select TWO).

    A. Deploy a honeypot

    B. Disable unnecessary services

    C. Change default passwords

    D. Implement an application firewall

    E. Penetration testing

  • Question 887:

    It is MOST important to make sure that the firewall is configured to do which of the following?

    A. Alert management of a possible intrusion.

    B. Deny all traffic and only permit by exception.

    C. Deny all traffic based on known signatures.

    D. Alert the administrator of a possible intrusion.

  • Question 888:

    An administrator needs to secure RADIUS traffic between two servers. Which of the following is the BEST solution?

    A. Require IPSec with AH between the servers

    B. Require the message-authenticator attribute for each message

    C. Use MSCHAPv2 with MPPE instead of PAP

    D. Require a long and complex shared secret for the servers

  • Question 889:

    A user has plugged in a wireless router from home with default configurations into a network jack at the office. This is known as:

    A. an evil twin.

    B. an IV attack.

    C. a rogue access point.

    D. an unauthorized entry point.

  • Question 890:

    When confidentiality is the primary concern, and a secure channel for key exchange is not available, which of the following should be used for transmitting company documents?

    A. Digital Signature

    B. Symmetric

    C. Asymmetric

    D. Hashing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.