We maintain your CompTIA CompTIA exam questions and answers comprehensive and also complete, which in turn guarantee your own excellent success. The useful CompTIA JK0-022 practice questions are designed in accordance with all the latest CompTIA JK0-022 exam syllabus. Its an easy case for you to pass your CompTIA CompTIA JK0-022 exam if you take portion in our CompTIA JK0-022 coaching course. Pass4sures CompTIA JK0-022 goods cost somewhat money yet benefit anyone a lot.

2021 Jan JK0-022 practice

Q21. Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host? 

A. Installing anti-malware 

B. Implementing an IDS 

C. Taking a baseline configuration 

D. Disabling unnecessary services 

Answer:


Q22. A network administrator is asked to send a large file containing PII to a business associate. 

Which of the following protocols is the BEST choice to use? 

A. SSH 

B. SFTP 

C. SMTP 

D. FTP 

Answer:


Q23. An auditing team has found that passwords do not meet best business practices. Which of the following will MOST increase the security of the passwords? (Select TWO). 

A. Password Complexity 

B. Password Expiration 

C. Password Age 

D. Password Length 

E. Password History 

Answer: A,D 


Q24. Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer information in a recycle bin without shredding it first. This is MOST likely to increase the risk of loss from which of the following attacks? 

A. Shoulder surfing 

B. Dumpster diving 

C. Tailgating 

D. Spoofing 

Answer:


Q25. Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication. 

Which of the following is an authentication method Jane should use? 

A. WPA2-PSK 

B. WEP-PSK 

C. CCMP 

D. LEAP 

Answer:


Rebirth JK0-022 rapidshare:

Q26. Which of the following means of wireless authentication is easily vulnerable to spoofing? 

A. MAC Filtering 

B. WPA - LEAP 

C. WPA - PEAP 

D. Enabled SSID 

Answer:


Q27. An administrator finds that non-production servers are being frequently compromised, production servers are rebooting at unplanned times and kernel versions are several releases behind the version with all current security fixes. Which of the following should the administrator implement? 

A. Snapshots 

B. Sandboxing 

C. Patch management 

D. Intrusion detection system 

Answer:


Q28. Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective? 

A. CHAP 

B. SAML 

C. Kerberos 

D. Diameter 

Answer:


Q29. Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment? 

A. Protocol analyzer 

B. Router 

C. Firewall 

D. HIPS 

Answer:


Q30. Which of the following solutions provides the most flexibility when testing new security controls prior to implementation? 

A. Trusted OS 

B. Host software baselining 

C. OS hardening 

D. Virtualization 

Answer: