Leads4pass > CompTIA > CompTIA Security+ > JK0-022 > JK0-022 Online Practice Questions and Answers

JK0-022 Online Practice Questions and Answers

Questions 4

Which of the following BEST describes the weakness in WEP encryption?

A. The initialization vector of WEP uses a crack-able RC4 encryption algorithm. Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived.

B. The WEP key is stored in plain text and split in portions across 224 packets of random data. Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key.

C. The WEP key has a weak MD4 hashing algorithm used. A simple rainbow table can be used to generate key possibilities due to MD4 collisions.

D. The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.

Buy Now
Questions 5

Matt, a security administrator, wants to configure all the switches and routers in the network in order to securely monitor their status. Which of the following protocols would he need to configure on each device?

A. SMTP

B. SNMPv3

C. IPSec

D. SNMP

Buy Now
Questions 6

Joe, the information security manager, is tasked with calculating risk and selecting controls to protect a new system. He has identified people, environmental conditions, and events that could affect the new system. Which of the following does he need to estimate NEXT in order to complete his risk calculations?

A. Vulnerabilities

B. Risk

C. Likelihood

D. Threats

Buy Now
Questions 7

Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?

A. DIAMETER

B. RADIUS

C. TACACS+

D. Kerberos

Buy Now
Questions 8

An insurance company requires an account recovery process so that information created by an employee can be accessed after that employee is no longer with the firm. Which of the following is the BEST approach to implement this process?

A. Employee is required to share their password with authorized staff prior to leaving the firm

B. Passwords are stored in a reversible form so that they can be recovered when needed

C. Authorized employees have the ability to reset passwords so that the data is accessible

D. All employee data is exported and imported by the employee prior to them leaving the firm

Buy Now
Questions 9

A system administrator has noticed that users change their password many times to cycle back to the original password when their passwords expire. Which of the following would BEST prevent this behavior?

A. Assign users passwords based upon job role.

B. Enforce a minimum password age policy.

C. Prevent users from choosing their own passwords.

D. Increase the password expiration time frame.

Buy Now
Questions 10

Which of the following security account management techniques should a security analyst implement to prevent staff, who has switched company roles, from exceeding privileges?

A. Internal account audits

B. Account disablement

C. Time of day restriction

D. Password complexity

Buy Now
Questions 11

A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has experienced several laptop thefts from the cafe during peak shopping hours of the day.

Corporate has asked that the IT department provide a solution to eliminate laptop theft.

Which of the following would provide the IT department with the BEST solution?

A. Attach cable locks to each laptop

B. Require each customer to sign an AUP

C. Install a GPS tracking device onto each laptop

D. Install security cameras within the perimeter of the caf

Buy Now
Questions 12

Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?

A. Protocol analyzer

B. Router

C. Firewall

D. HIPS

Buy Now
Questions 13

Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?

A. It should be enforced on the client side only.

B. It must be protected by SSL encryption.

C. It must rely on the user's knowledge of the application.

D. It should be performed on the server side.

Buy Now
Exam Code: JK0-022
Exam Name: CompTIA Security+ Certification
Last Update: Dec 14, 2024
Questions: 1149
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99