★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW JK0-022 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/JK0-022-dumps.html


Act now and download your CompTIA JK0-022 test today! Do not waste time for the worthless CompTIA JK0-022 tutorials. Download Down to date CompTIA CompTIA Academic/E2C Security+ Certification Exam Voucher Only exam with real questions and answers and begin to learn CompTIA JK0-022 with a classic professional.

2021 Nov jk0-022 vce:

Q51. An administrator needs to renew a certificate for a web server. Which of the following should be submitted to a CA? 

A. CSR 

B. Recovery agent 

C. Private key 

D. CRL 

Answer:


Q52. Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway? 

A. Wireless jamming 

B. Evil twin 

C. Rogue AP 

D. Packet sniffing 

Answer:


Q53. Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective? 

A. CHAP 

B. SAML 

C. Kerberos 

D. Diameter 

Answer:


Q54. A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs show repeated connection attempts from the following IPs: 

10.10.3.16 

10.10.3.23 

212.178.24.26 

217.24.94.83 

These attempts are overloading the server to the point that it cannot respond to traffic. Which of the following attacks is occurring? 

A. XSS 

B. DDoS 

C. DoS 

D. Xmas 

Answer:


Q55. By default, which of the following uses TCP port 22? (Select THREE). 

A. FTPS 

B. STELNET 

C. TLS 

D. SCP 

E. SSL 

F. HTTPS 

G. SSH 

H. SFTP 

Answer: D,G,H 


Renewal jk0-022 vs sy0-401:

Q56. Which of the following means of wireless authentication is easily vulnerable to spoofing? 

A. MAC Filtering 

B. WPA - LEAP 

C. WPA - PEAP 

D. Enabled SSID 

Answer:


Q57. A security administrator has concerns regarding employees saving data on company provided mobile devices. Which of the following would BEST address the administrator’s concerns? 

A. Install a mobile application that tracks read and write functions on the device. 

B. Create a company policy prohibiting the use of mobile devices for personal use. 

C. Enable GPS functionality to track the location of the mobile devices. 

D. Configure the devices so that removable media use is disabled. 

Answer:


Q58. Which of the following should an administrator implement to research current attack methodologies? 

A. Design reviews 

B. Honeypot 

C. Vulnerability scanner 

D. Code reviews 

Answer:


Q59. Ann, the security administrator, wishes to implement multifactor security. Which of the following should be implemented in order to compliment password usage and smart cards? 

A. Hard tokens 

B. Fingerprint readers 

C. Swipe badge readers 

D. Passphrases 

Answer:


Q60. Which of the following describes a type of malware which is difficult to reverse engineer in a virtual lab? 

A. Armored virus 

B. Polymorphic malware 

C. Logic bomb 

D. Rootkit 

Answer: