★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW JK0-022 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/JK0-022-dumps.html


Free of JK0-022 actual exam materials and practice for CompTIA certification for IT engineers, Real Success Guaranteed with Updated JK0-022 pdf dumps vce Materials. 100% PASS CompTIA Academic/E2C Security+ Certification Exam Voucher Only exam Today!

2021 Oct jk0-022 comptia academic/e2c security+:

Q131. An administrator discovers that many users have used their same passwords for years even though the network requires that the passwords be changed every six weeks. Which of the following, when used together, would BEST prevent users from reusing their existing password? (Select TWO). 

A. Length of password 

B. Password history 

C. Minimum password age 

D. Password expiration 

E. Password complexity 

F. Non-dictionary words 

Answer: B,C 


Q132. When performing the daily review of the system vulnerability scans of the network Joe, the administrator, noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe researches the assigned vulnerability identification number from the vendor website. Joe proceeds with applying the recommended solution for identified vulnerability. 

Which of the following is the type of vulnerability described? 

A. Network based 

B. IDS 

C. Signature based 

D. Host based 

Answer: C 


Q133. A security administrator wishes to increase the security of the wireless network. Which of the following BEST addresses this concern? 

A. Change the encryption from TKIP-based to CCMP-based. 

B. Set all nearby access points to operate on the same channel. 

C. Configure the access point to use WEP instead of WPA2. 

D. Enable all access points to broadcast their SSIDs. 

Answer: A 


Q134. The Quality Assurance team is testing a new third party developed application. The Quality team does not have any experience with the application. Which of the following is the team performing? 

A. Grey box testing 

B. Black box testing 

C. Penetration testing 

D. White box testing 

Answer: B 


Q135. Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information. Which of the following will accomplish this task securely? 

A. Digital Signatures 

B. Hashing 

C. Secret Key 

D. Encryption 

Answer: D 


JK0-022 free practice test

Renewal comptia jk0-022:

Q136. An access point has been configured for AES encryption but a client is unable to connect to it. Which of the following should be configured on the client to fix this issue? 

A. WEP 

B. CCMP 

C. TKIP 

D. RC4 

Answer: B 


Q137. Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her office without supplying a username/password combination. Upon disconnecting from the wireless network, she attempted to connect her personal tablet computer to the same wireless network and could not connect. 

Which of the following is MOST likely the reason? 

A. The company wireless is using a MAC filter. 

B. The company wireless has SSID broadcast disabled. 

C. The company wireless is using WEP. 

D. The company wireless is using WPA2. 

Answer: A 


Q138. The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future? 

A. Job rotation 

B. Separation of duties 

C. Mandatory Vacations 

D. Least Privilege 

Answer: B 


Q139. A security administrator must implement a network authentication solution which will ensure encryption of user credentials when users enter their username and password to authenticate to the network. 

Which of the following should the administrator implement? 

A. WPA2 over EAP-TTLS 

B. WPA-PSK 

C. WPA2 with WPS 

D. WEP over EAP-PEAP 

Answer: D 


Q140. Human Resources suspects an employee is accessing the employee salary database. The administrator is asked to find out who it is. In order to complete this task, which of the following is a security control that should be in place? 

A. Shared accounts should be prohibited. 

B. Account lockout should be enabled 

C. Privileges should be assigned to groups rather than individuals 

D. Time of day restrictions should be in use 

Answer: A