IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CompTIA JK0-022 인증덤프

Pass4Test의 CompTIA JK0-022 (CompTIA Security+ Certification) 덤프를 구매하시면 1년동안 무료 업데이트서비스버전을 받을수 있습니다. 시험문제가 변경되면 업데이트 하도록 최선을 다하기에  Pass4Test의 CompTIA JK0-022 (CompTIA Security+ Certification) 덤프의 유효기간을 연장시켜드리는 셈입니다.퍼펙트한 구매후는 서비스는 Pass4Test의 CompTIA JK0-022 (CompTIA Security+ Certification) 덤프를 구매하시면 받을수 있습니다.

 

NO.1 Which of the following means of wireless authentication is easily vulnerable to spoofing?

A. MAC Filtering

B. WPA - LEAP

C. WPA - PEAP

D. Enabled SSID

Answer: A

 

NO.2 Which of the following can a security administrator implement on mobile devices that will

help prevent unwanted people from viewing the data if the device is left unattended?

A. Screen lock

B. Voice encryption

C. GPS tracking

D. Device encryption

Answer: A

 

NO.3 Which of the following risk concepts requires an organization to determine the number of

failures per year?

A. SLE

B. ALE

C. MTBF

D. Quantitative analysis

Answer: B

 

NO.4 A security administrator wants to perform routine tests on the network during working hours

when certain applications are being accessed by the most people. Which of the following would

allow the security administrator to test the lack of security controls for those applications with the

least impact to the system?

A. Penetration test

B. Vulnerability scan

C. Load testing

D. Port scanner

Answer: B

 

NO.5 The helpdesk reports increased calls from clients reporting spikes in malware infections on

their systems. Which of the following phases of incident response is MOST appropriate as a FIRST

response?

A. Recovery

B. Follow-up

C. Validation

D. Identification

E. Eradication

F. Containment

Answer: D

 

NO.6 Which of the following protocols operates at the HIGHEST level of the OSI model?

A. ICMP

B. IPSec

C. SCP

D. TCP

Answer: C

 

NO.7 A system security analyst using an enterprise monitoring tool notices an unknown internal

host exfiltrating files to several foreign IP addresses. Which of the following would be an

appropriate mitigation technique?

A. Disabling unnecessary accounts

B. Rogue machine detection

C. Encrypting sensitive files

D. Implementing antivirus

Answer: B

 

NO.8 Which of the following can be implemented in hardware or software to protect a web server

from cross-site scripting attacks?

A. Intrusion Detection System

B. Flood Guard Protection

C. Web Application Firewall

D. URL Content Filter

Answer: C

 

Posted 2014/7/16 14:22:36  |  Category: CompTIA  |  Tag: JK0-022 인증덤프