It is more faster and easier to pass the CompTIA JK0-022 exam by using Refined CompTIA CompTIA Academic/E2C Security+ Certification Exam Voucher Only questuins and answers. Immediate access to the Up to the immediate present JK0-022 Exam and find the same core area JK0-022 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Nov JK0-022 brain dumps

Q71. During the analysis of a PCAP file, a security analyst noticed several communications with a remote server on port 53. Which of the following protocol types is observed in this traffic? 

A. FTP 

B. DNS 

C. Email 

D. NetBIOS 

Answer:


Q72. A datacenter requires that staff be able to identify whether or not items have been removed from the facility. Which of the following controls will allow the organization to provide automated notification of item removal? 

A. CCTV 

B. Environmental monitoring 

C. RFID 

D. EMI shielding 

Answer:


Q73. A company’s employees were victims of a spear phishing campaign impersonating the CEO. The company would now like to implement a solution to improve the overall security posture by assuring their employees that email originated from the CEO. Which of the following controls could they implement to BEST meet this goal? 

A. Spam filter 

B. Digital signatures 

C. Antivirus software 

D. Digital certificates 

Answer:


Q74. Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her office without supplying a username/password combination. Upon disconnecting from the wireless network, she attempted to connect her personal tablet computer to the same wireless network and could not connect. 

Which of the following is MOST likely the reason? 

A. The company wireless is using a MAC filter. 

B. The company wireless has SSID broadcast disabled. 

C. The company wireless is using WEP. 

D. The company wireless is using WPA2. 

Answer:


Q75. Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify that the email came from Joe and decrypt it? (Select TWO). 

A. The CA’s public key 

B. Ann’s public key 

C. Joe’s private key 

D. Ann’s private key 

E. The CA’s private key 

F. Joe’s public key 

Answer: D,F 


Renewal JK0-022 free exam questions:

Q76. Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow incoming SFTP connections? 

A. 21/UDP 

B. 21/TCP 

C. 22/UDP 

D. 22/TCP 

Answer:


Q77. An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire? 

A. Install a proxy server between the users’ computers and the switch to filter inbound network traffic. 

B. Block commonly used ports and forward them to higher and unused port numbers. 

C. Configure the switch to allow only traffic from computers based upon their physical address. 

D. Install host-based intrusion detection software to monitor incoming DHCP Discover requests. 

Answer:


Q78. A security technician has been asked to recommend an authentication mechanism that will allow users to authenticate using a password that will only be valid for a predefined time interval. Which of the following should the security technician recommend? 

A. CHAP 

B. TOTP 

C. HOTP 

D. PAP 

Answer:


Q79. A new intern was assigned to the system engineering department, which consists of the system architect and system software developer’s teams. These two teams have separate privileges. The intern requires privileges to view the system architectural drawings and comment on some software development projects. Which of the following methods should the system administrator implement? 

A. Group based privileges 

B. Generic account prohibition 

C. User access review 

D. Credential management 

Answer:


Q80. Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites? 

A. Spam filter 

B. URL filter 

C. Content inspection 

D. Malware inspection 

Answer: