Pass4itsure > CompTIA > CompTIA Security+ > JK0-022 > JK0-022 Online Practice Questions and Answers

JK0-022 Online Practice Questions and Answers

Questions 4

A security technician needs to open ports on a firewall to allow for domain name resolution. Which of the following ports should be opened? (Select TWO).

A. TCP 21

B. TCP 23

C. TCP 53

D. UDP 23

E. UDP 53

Buy Now
Questions 5

Users are unable to connect to the web server at IP 192.168.0.20. Which of the following can be inferred of a firewall that is configured ONLY with the following ACL?

PERMIT TCP ANY HOST 192.168.0.10 EQ 80 PERMIT TCP ANY HOST 192.168.0.10 EQ 443

A. It implements stateful packet filtering.

B. It implements bottom-up processing.

C. It failed closed.

D. It implements an implicit deny.

Buy Now
Questions 6

A corporation is looking to expand their data center but has run out of physical space in which to store hardware. Which of the following would offer the ability to expand while keeping their current data center operated by internal staff?

A. Virtualization

B. Subnetting

C. IaaS

D. SaaS

Buy Now
Questions 7

A company hired Joe, an accountant. The IT administrator will need to create a new account for Joe. The company uses groups for ease of management and administration of user accounts. Joe will need network access to all directories, folders and files within the accounting department.

Which of the following configurations will meet the requirements?

A. Create a user account and assign the user account to the accounting group.

B. Create an account with role-based access control for accounting.

C. Create a user account with password reset and notify Joe of the account creation.

D. Create two accounts: a user account and an account with full network administration rights.

Buy Now
Questions 8

ABC company has a lot of contractors working for them. The provisioning team does not always get notified that a contractor has left the company. Which of the following policies would prevent contractors from having access to systems in the event a contractor has left?

A. Annual account review

B. Account expiration policy

C. Account lockout policy

D. Account disablement

Buy Now
Questions 9

Pete, the Chief Executive Officer (CEO) of a company, has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?

A. Succession planning

B. Disaster recovery

C. Separation of duty

D. Removing single loss expectancy

Buy Now
Questions 10

Customers' credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future?

A. Application firewalls

B. Manual updates

C. Firmware version control

D. Encrypted TCP wrappers

Buy Now
Questions 11

Several departments within a company have a business need to send high volumes of confidential information to customers via email. Which of the following is the BEST solution to mitigate unintentional exposure of confidential information?

A. Employ encryption on all outbound emails containing confidential information.

B. Employ exact data matching and prevent inbound emails with Data Loss Prevention.

C. Employ hashing on all outbound emails containing confidential information.

D. Employ exact data matching and encrypt inbound e-mails with Data Loss Prevention.

Buy Now
Questions 12

Which of the following can be implemented if a security administrator wants only certain devices connecting to the wireless network?

A. Disable SSID broadcast

B. Install a RADIUS server

C. Enable MAC filtering

D. Lowering power levels on the AP

Buy Now
Questions 13

A system administrator has noticed vulnerability on a high impact production server. A recent update was made available by the vendor that addresses the vulnerability but requires a reboot of the system afterwards. Which of the following steps should the system administrator implement to address the vulnerability?

A. Test the update in a lab environment, schedule downtime to install the patch, install the patch and reboot the server and monitor for any changes

B. Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the patch, and monitor for any changes

C. Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the update, reboot the server, and monitor for any changes

D. Backup the server, schedule downtime to install the patch, installs the patch and monitor for any changes

Buy Now
Exam Code: JK0-022
Exam Name: CompTIA Security+ Certification
Last Update: Nov 30, 2024
Questions: 1149
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99