An CompTIA JK0-022 Qualification is among the brightest job goes you could make for your self for anybody who is fitness instructor portion of the JK0-022 manufacturer to acquire a CompTIA. Them secures that you just are members of this kind of business plus easily confers attributes involving competent, accountable, plus able upon people. Becoming on the internet JK0-022 qualification coaching around will improve your practical knowledge along with know-how.

2021 Nov JK0-022 practice question

Q101. A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to each password before the password is hashed. This technique is known as: 

A. symmetric cryptography. 

B. private key cryptography. 

C. salting. 

D. rainbow tables. 

Answer:


Q102. A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them to customer PCs. 

Which of the following should the administrator use to test the patching process quickly and often? 

A. Create an incremental backup of an unpatched PC 

B. Create an image of a patched PC and replicate it to servers 

C. Create a full disk image to restore after each installation 

D. Create a virtualized sandbox and utilize snapshots 

Answer:


Q103. Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks? 

A. Intrusion Detection System 

B. Flood Guard Protection 

C. Web Application Firewall 

D. URL Content Filter 

Answer:


Q104. An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal? 

A. Unified Threat Management 

B. Virtual Private Network 

C. Single sign on 

D. Role-based management 

Answer:


Q105. Which of the following was based on a previous X.500 specification and allows either unencrypted authentication or encrypted authentication through the use of TLS? 

A. Kerberos 

B. TACACS+ 

C. RADIUS 

D. LDAP 

Answer:


Renovate JK0-022 exam question:

Q106. Several employees submit the same phishing email to the administrator. The administrator finds that the links in the email are not being blocked by the company’s security device. Which of the following might the administrator do in the short term to prevent the emails from being received? 

A. Configure an ACL 

B. Implement a URL filter 

C. Add the domain to a block list 

D. Enable TLS on the mail server 

Answer:


Q107. Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify the validity’s of Joe’s certificate? (Select TWO). 

A. The CA’s public key 

B. Joe’s private key 

C. Ann’s public key 

D. The CA’s private key 

E. Joe’s public key 

F. Ann’s private key 

Answer: A,E 


Q108. An organization has introduced token-based authentication to system administrators due to risk of password compromise. The tokens have a set of numbers that automatically change every 30 seconds. Which of the following type of authentication mechanism is this? 

A. TOTP 

B. Smart card 

C. CHAP 

D. HOTP 

Answer:


Q109. A vulnerability assessment indicates that a router can be accessed from default port 80 and default port 22. Which of the following should be executed on the router to prevent access via these ports? (Select TWO). 

A. FTP service should be disabled 

B. HTTPS service should be disabled 

C. SSH service should be disabled 

D. HTTP service should disabled 

E. Telnet service should be disabled 

Answer: C,D 


Q110. An administrator needs to renew a certificate for a web server. Which of the following should be submitted to a CA? 

A. CSR 

B. Recovery agent 

C. Private key 

D. CRL 

Answer: