Leads4pass > CompTIA > CompTIA Security+ > JK0-022 > JK0-022 Online Practice Questions and Answers

JK0-022 Online Practice Questions and Answers

Questions 4

A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?

A. Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP

B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS

C. Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS

D. Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS

Buy Now
Questions 5

Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?

A. NAT

B. Virtualization

C. NAC

D. Subnetting

Buy Now
Questions 6

Signed digital certificates used to secure communication with a web server are MOST commonly associated with which of the following ports?

A. 25

B. 53

C. 143

D. 443

Buy Now
Questions 7

Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed

to?

A. PAP, MSCHAPv2

B. CHAP, PAP

C. MSCHAPv2, NTLMv2

D. NTLM, NTLMv2

Buy Now
Questions 8

A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO's requirements?

A. Username and password

B. Retina scan and fingerprint scan

C. USB token and PIN

D. Proximity badge and token

Buy Now
Questions 9

Human Resources suspect an employee is accessing the employee salary database. The administrator is asked to find out who it is. In order to complete this task, which of the following is a security control that should be in place?

A. Shared accounts should be prohibited.

B. Account lockout should be enabled

C. Privileges should be assigned to groups rather than individuals

D. Time of day restrictions should be in use

Buy Now
Questions 10

An administrator notices an unusual spike in network traffic from many sources. The administrator suspects that:

A. it is being caused by the presence of a rogue access point.

B. it is the beginning of a DDoS attack.

C. the IDS has been compromised.

D. the internal DNS tables have been poisoned.

Buy Now
Questions 11

Users are encouraged to click on a link in an email to obtain exclusive access to the newest version of a popular Smartphone. This is an example of.

A. Scarcity

B. Familiarity

C. Intimidation

D. Trust

Buy Now
Questions 12

A small company has recently purchased cell phones for managers to use while working outside if the office.

The company does not currently have a budget for mobile device management and is primarily concerned with deterring leaks if sensitive information obtained by unauthorized access to unattended phones. Which of the following would provide the solution BEST meets the company's requirements?

A. Screen-lock

B. Disable removable storage

C. Full device encryption

D. Remote wiping

Buy Now
Questions 13

An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests. Which of the following describes how this private key should be stored so that it is protected from theft?

A. Implement full disk encryption

B. Store on encrypted removable media

C. Utilize a hardware security module

D. Store on web proxy file system

Buy Now
Exam Code: JK0-022
Exam Name: CompTIA Security+ Certification
Last Update: Nov 11, 2024
Questions: 1149
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99