It is impossible to pass CompTIA JK0-022 exam without any help in the short term. Come to Exambible soon and find the most advanced, correct and guaranteed CompTIA JK0-022 practice questions. You will get a surprising result by our Abreast of the times CompTIA Academic/E2C Security+ Certification Exam Voucher Only practice guides.

2021 Dec JK0-022 exam engine

Q1. A malicious individual is attempting to write too much data to an application’s memory. Which of the following describes this type of attack? 

A. Zero-day 

B. SQL injection 

C. Buffer overflow 

D. XSRF 

Answer:


Q2. A security manager must remain aware of the security posture of each system. Which of the following supports this requirement? 

A. Training staff on security policies 

B. Establishing baseline reporting 

C. Installing anti-malware software 

D. Disabling unnecessary accounts/services 

Answer:


Q3. A security technician at a small business is worried about the Layer 2 switches in the network suffering from a DoS style attack caused by staff incorrectly cabling network connections between switches. Which of the following will BEST mitigate the risk if implemented on the switches? 

A. Spanning tree 

B. Flood guards 

C. Access control lists 

D. Syn flood 

Answer:


Q4. Which of the following types of authentication packages user credentials in a ticket? 

A. Kerberos 

B. LDAP 

C. TACACS+ 

D. RADIUS 

Answer:


Q5. In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following? 

A. Identification 

B. Authorization 

C. Authentication 

D. Multifactor authentication 

Answer:


Improved JK0-022 testing engine:

Q6. A recent audit has discovered that at the time of password expiration clients are able to recycle the previous credentials for authentication. Which of the following controls should be used together to prevent this from occurring? (Select TWO). 

A. Password age 

B. Password hashing 

C. Password complexity 

D. Password history 

E. Password length 

Answer: A,D 


Q7. A security administrator must implement a wireless encryption system to secure mobile devices’ communication. Some users have mobile devices which only support 56-bit encryption. Which of the following wireless encryption methods should be implemented? 

A. RC4 

B. AES 

C. MD5 

D. TKIP 

Answer:


Q8. Which of the following should an administrator implement to research current attack methodologies? 

A. Design reviews 

B. Honeypot 

C. Vulnerability scanner 

D. Code reviews 

Answer:


Q9. The company’s sales team plans to work late to provide the Chief Executive Officer (CEO) with a special report of sales before the quarter ends. After working for several hours, the team finds they cannot save or print the reports. 

Which of the following controls is preventing them from completing their work? 

A. Discretionary access control 

B. Role-based access control 

C. Time of Day access control 

D. Mandatory access control 

Answer:


Q10. Access mechanisms to data on encrypted USB hard drives must be implemented correctly otherwisE. 

A. user accounts may be inadvertently locked out. 

B. data on the USB drive could be corrupted. 

C. data on the hard drive will be vulnerable to log analysis. 

D. the security controls on the USB drive can be bypassed. 

Answer: