Pass4Test의 CompTIA JK0-022 (CompTIA Security+ Certification) 덤프를 구매하시면 1년동안 무료 업데이트서비스버전을 받을수 있습니다. 시험문제가 변경되면 업데이트 하도록 최선을 다하기에 Pass4Test의 CompTIA JK0-022 (CompTIA Security+ Certification) 덤프의 유효기간을 연장시켜드리는 셈입니다.퍼펙트한 구매후는 서비스는 Pass4Test의 CompTIA JK0-022 (CompTIA Security+ Certification) 덤프를 구매하시면 받을수 있습니다.
NO.1 Which of the following means of wireless authentication is easily vulnerable to spoofing?
A. MAC Filtering
B. WPA - LEAP
C. WPA - PEAP
D. Enabled SSID
Answer: A
NO.2 Which of the following can a security administrator implement on mobile devices that will
help prevent unwanted people from viewing the data if the device is left unattended?
A. Screen lock
B. Voice encryption
C. GPS tracking
D. Device encryption
Answer: A
NO.3 Which of the following risk concepts requires an organization to determine the number of
failures per year?
A. SLE
B. ALE
C. MTBF
D. Quantitative analysis
Answer: B
NO.4 A security administrator wants to perform routine tests on the network during working hours
when certain applications are being accessed by the most people. Which of the following would
allow the security administrator to test the lack of security controls for those applications with the
least impact to the system?
A. Penetration test
B. Vulnerability scan
C. Load testing
D. Port scanner
Answer: B
NO.5 The helpdesk reports increased calls from clients reporting spikes in malware infections on
their systems. Which of the following phases of incident response is MOST appropriate as a FIRST
response?
A. Recovery
B. Follow-up
C. Validation
D. Identification
E. Eradication
F. Containment
Answer: D
NO.6 Which of the following protocols operates at the HIGHEST level of the OSI model?
A. ICMP
B. IPSec
C. SCP
D. TCP
Answer: C
NO.7 A system security analyst using an enterprise monitoring tool notices an unknown internal
host exfiltrating files to several foreign IP addresses. Which of the following would be an
appropriate mitigation technique?
A. Disabling unnecessary accounts
B. Rogue machine detection
C. Encrypting sensitive files
D. Implementing antivirus
Answer: B
NO.8 Which of the following can be implemented in hardware or software to protect a web server
from cross-site scripting attacks?
A. Intrusion Detection System
B. Flood Guard Protection
C. Web Application Firewall
D. URL Content Filter
Answer: C