Want to know Actualtests JK0-022 Exam practice test features? Want to lear more about CompTIA CompTIA Academic/E2C Security+ Certification Exam Voucher Only certification experience? Study Certified CompTIA JK0-022 answers to Rebirth JK0-022 questions at Actualtests. Gat a success with an absolute guarantee to pass CompTIA JK0-022 (CompTIA Academic/E2C Security+ Certification Exam Voucher Only) test on your first attempt.

2021 Nov JK0-022 practice

Q91. The helpdesk reports increased calls from clients reporting spikes in malware infections on their systems. Which of the following phases of incident response is MOST appropriate as a FIRST response? 

A. Recovery 

B. Follow-up 

C. Validation 

D. Identification 

E. Eradication 

F. Containment 

Answer:


Q92. Identifying residual risk is MOST important to which of the following concepts? 

A. Risk deterrence 

B. Risk acceptance 

C. Risk mitigation 

D. Risk avoidance 

Answer:


Q93. A security team has established a security awareness program. Which of the following would BEST prove the success of the program? 

A. Policies 

B. Procedures 

C. Metrics 

D. Standards 

Answer:


Q94. In which of the following steps of incident response does a team analyze the incident and determine steps to prevent a future occurrence? 

A. Mitigation 

B. Identification 

C. Preparation 

D. Lessons learned 

Answer:


Q95. An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols? 

A. TCP/IP 

B. SSL 

C. SCP 

D. SSH 

Answer:


Updated JK0-022 exam answers:

Q96. Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be accessed using the same password. The company’s network device security policy mandates that at least one virtual terminal have a different password than the other virtual terminals. Which of the following sets of commands would meet this requirement? 

A. line vty 0 6 P@s5W0Rd password line vty 7 Qwer++!Y password 

B. line console 0 password password line vty 0 4 password P@s5W0Rd 

C. line vty 0 3 password Qwer++!Y line vty 4 password P@s5W0Rd 

D. line vty 0 3 password Qwer++!Y line console 0 password P@s5W0Rd 

Answer:


Q97. Which of the following protocols operates at the HIGHEST level of the OSI model? 

A. ICMP 

B. IPSec 

C. SCP 

D. TCP 

Answer:


Q98. Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a competitor. Joe had already been working for two hours before leaving the premises. 

A security technician was asked to prepare a report of files that had changed since last night’s integrity scan. Which of the following could the technician use to prepare the report? (Select TWO). 

A. PGP 

B. MD5 

C. ECC 

D. AES 

E. Blowfish 

F. HMAC 

Answer: B,F 


Q99. The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity. 

Which of the following would be MOST effective for preventing this behavior? 

A. Acceptable use policies 

B. Host-based firewalls 

C. Content inspection 

D. Application whitelisting 

Answer:


Q100. Which of the following would allow the organization to divide a Class C IP address range into several ranges? 

A. DMZ 

B. Virtual LANs 

C. NAT 

D. Subnetting 

Answer: