Exam Details

  • Exam Code
    :JK0-022
  • Exam Name
    :CompTIA Security+ Certification
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :1149 Q&As
  • Last Updated
    :Feb 05, 2025

CompTIA CompTIA Security+ JK0-022 Questions & Answers

  • Question 921:

    A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration. Which of the following should be implemented to secure the devices without risking availability?

    A. Host-based firewall

    B. IDS

    C. IPS

    D. Honeypot

  • Question 922:

    Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety of servers before deployment to the production environment while utilizing a limited amount of hardware resources. Which of the following would provide the BEST environment for performing this testing?

    A. OS hardening

    B. Application control

    C. Virtualization

    D. Sandboxing

  • Question 923:

    Which of the following is a control that allows a mobile application to access and manipulate information which should only be available by another application on the same mobile device (e.g. a music application posting the name of the current song playing on the device on a social media site)?

    A. Co-hosted application

    B. Transitive trust

    C. Mutually exclusive access

    D. Dual authentication

  • Question 924:

    During a disaster recovery planning session, a security administrator has been tasked with determining which threats and vulnerabilities pose a risk to the organization. Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organization?

    A. Hostile takeovers

    B. Large scale natural disasters

    C. Malware and viruses

    D. Corporate espionage

  • Question 925:

    Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent penetration test reveals vulnerabilities on the network. Which of the following has been reported by the vulnerability scan?

    A. Passive scan

    B. Active scan

    C. False positive

    D. False negative

  • Question 926:

    A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of the following can the technician use to verify if a system file was compromised? (Select TWO).

    A. AES

    B. PGP

    C. SHA

    D. MD5

    E. ECDHE

  • Question 927:

    A company is concerned that a compromised certificate may result in a man-in-the-middle attack against backend financial servers. In order to minimize the amount of time a compromised certificate would be accepted by other servers, the

    company decides to add another validation step to SSL/TLS connections.

    Which of the following technologies provides the FASTEST revocation capability?

    A. Online Certificate Status Protocol (OCSP)

    B. Public Key Cryptography (PKI)

    C. Certificate Revocation Lists (CRL)

    D. Intermediate Certificate Authority (CA)

  • Question 928:

    Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program that encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same program to create a hidden volume within the

    encrypted hard drive and stores the sensitive information within the hidden volume.

    This is an example of which of the following? (Select TWO).

    A. Multi-pass encryption

    B. Transport encryption

    C. Plausible deniability

    D. Steganography

    E. Transitive encryption

    F. Trust models

  • Question 929:

    Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on employees' computers?

    A. Least privilege accounts

    B. Host-based firewalls

    C. Intrusion Detection Systems

    D. Application white listing

  • Question 930:

    A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion. Which of the following technologies would BEST be suited to accomplish this?

    A. Transport Encryption

    B. Stream Encryption

    C. Digital Signature

    D. Steganography

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-022 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.