Act now and download your CompTIA JK0-022 test today! Do not waste time for the worthless CompTIA JK0-022 tutorials. Download Down to date CompTIA CompTIA Academic/E2C Security+ Certification Exam Voucher Only exam with real questions and answers and begin to learn CompTIA JK0-022 with a classic professional.

2021 Jan JK0-022 latest exam

Q41. A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales department? 

A. Time of day restrictions 

B. Group based privileges 

C. User assigned privileges 

D. Domain admin restrictions 

Answer:


Q42. Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network? 

A. Near field communication 

B. IV attack 

C. Evil twin 

D. Replay attack 

Answer:


Q43. Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign the file? 

A. Joe’s public key 

B. Joe’s private key 

C. Ann’s public key 

D. Ann’s private key 

Answer:


Q44. An administrator wants to establish a WiFi network using a high gain directional antenna with a narrow radiation pattern to connect two buildings separated by a very long distance. Which of the following antennas would be BEST for this situation? 

A. Dipole 

B. Yagi 

C. Sector 

D. Omni 

Answer:


Q45. A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by camouflaging data inside of other files? 

A. Integrity 

B. Confidentiality 

C. Steganography 

D. Availability 

Answer:


Up to the minute JK0-022 practice exam:

Q46. After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the following is this an example of? 

A. Privilege escalation 

B. Advanced persistent threat 

C. Malicious insider threat 

D. Spear phishing 

Answer:


Q47. Customers’ credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future? 

A. Application firewalls 

B. Manual updates 

C. Firmware version control 

D. Encrypted TCP wrappers 

Answer:


Q48. An administrator discovers that many users have used their same passwords for years even though the network requires that the passwords be changed every six weeks. Which of the following, when used together, would BEST prevent users from reusing their existing password? (Select TWO). 

A. Length of password 

B. Password history 

C. Minimum password age 

D. Password expiration 

E. Password complexity 

F. Non-dictionary words 

Answer: B,C 


Q49. A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates. 

Which of the following processes could MOST effectively mitigate these risks? 

A. Application hardening 

B. Application change management 

C. Application patch management 

D. Application firewall review 

Answer:


Q50. A recently installed application update caused a vital application to crash during the middle of the workday. The application remained down until a previous version could be reinstalled on the server, and this resulted in a significant loss of data and revenue. 

Which of the following could BEST prevent this issue from occurring again? 

A. Application configuration baselines 

B. Application hardening 

C. Application access controls 

D. Application patch management 

Answer: