★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW JK0-022 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/JK0-022-dumps.html


Proper study guides for Down to date CompTIA CompTIA Academic/E2C Security+ Certification Exam Voucher Only certified begins with CompTIA JK0-022 preparation products which designed to deliver the Download JK0-022 questions by making you pass the JK0-022 test at your first time. Try the free JK0-022 demo right now.

2021 Jul comptia jk0-022:

Q11. A bank has a fleet of aging payment terminals used by merchants for transactional processing. The terminals currently support single DES but require an upgrade in order to be compliant with security standards. Which of the following is likely to be the simplest upgrade to the aging terminals which will improve in-transit protection of transactional data? 

A. AES 

B. 3DES 

C. RC4 

D. WPA2 

Answer: B 


Q12. LDAP and Kerberos are commonly used for which of the following? 

A. To perform queries on a directory service 

B. To store usernames and passwords for Federated Identity 

C. To sign SSL wildcard certificates for subdomains 

D. To utilize single sign-on capabilities 

Answer: D 


Q13. Which of the following solutions provides the most flexibility when testing new security controls prior to implementation? 

A. Trusted OS 

B. Host software baselining 

C. OS hardening 

D. Virtualization 

Answer: D 


Q14. Ann, a security administrator, has concerns regarding her company’s wireless network. The network is open and available for visiting prospective clients in the conference room, but she notices that many more devices are connecting to the network than should be. 

Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality for clients? 

A. Enable MAC filtering on the wireless access point. 

B. Configure WPA2 encryption on the wireless access point. 

C. Lower the antenna’s broadcasting power. 

D. Disable SSID broadcasting. 

Answer: C 


Q15. A security administrator is reviewing the company’s continuity plan. The plan specifies an RTO of six hours and RPO of two days. Which of the following is the plan describing? 

A. Systems should be restored within six hours and no later than two days after the incident. 

B. Systems should be restored within two days and should remain operational for at least six hours. 

C. Systems should be restored within six hours with a minimum of two days worth of data. 

D. Systems should be restored within two days with a minimum of six hours worth of data. 

Answer: C 


JK0-022 study guide

Up to the minute jk0-022 comptia academic/e2c security+ certification exam voucher only:

Q16. A distributed denial of service attack can BEST be described as: A. invalid characters being entered into a field in a database application. 

B. users attempting to input random or invalid data into fields within a web browser application. 

C. multiple computers attacking a single target in an organized attempt to deplete its resources. 

D. multiple attackers attempting to gain elevated privileges on a target system. 

Answer: C 


Q17. Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication. 

Which of the following is an authentication method Jane should use? 

A. WPA2-PSK 

B. WEP-PSK 

C. CCMP 

D. LEAP 

Answer: D 


Q18. Which of the following encrypts data a single bit at a time? 

A. Stream cipher 

B. Steganography 

C. 3DES 

D. Hashing 

Answer: A 


Q19. A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure? 

A. IPsec 

B. SFTP 

C. BGP 

D. PPTP 

Answer: A 


Q20. A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates. 

Which of the following processes could MOST effectively mitigate these risks? 

A. Application hardening 

B. Application change management 

C. Application patch management 

D. Application firewall review 

Answer: C