CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Download Full Version : https://killexams.com/pass4sure/exam-detail/jk0-022
Answer: C QUESTION: 195 A security engineer is asked by the company s development team to recommend the most secure method for password storage. Which of the following provide the BEST protection against brute forcing stored passwords? (Select TWO). A. PBKDF2 B. MD5 C. SHA2 D. Bcrypt E. AES F. CHAP Answer: A, D QUESTION: 196 After entering the following information into a SOHO wireless router, a mobile device s user reports being unable to connect to the network: PERMIT 0A: D1: F A. B1: 03: 37 DENY 01: 33: 7F: AB: 10: AB Which of the following is preventing the device from connecting? A. WPA2-PSK requires a supplicant on the mobile device. B. Hardware address filtering is blocking the device. C. TCP/IP Port filtering has been implemented on the SOHO router. D. IP address filtering has disabled the device from connecting. Answer: B QUESTION: 197 The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity. Which of the following would be MOST effective for preventing this behavior? 85
A. Acceptable use policies B. Host-based firewalls C. Content inspection D. Application whitelisting QUESTION: 198 When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength? A. SHA B. AES C. DES D. RSA QUESTION: 199 A company has decided to move large data sets to a cloud provider in order to limit the costs of new infrastructure. Some of the data is sensitive and the Chief Information Officer wants to make sure both parties have a clear understanding of the controls needed to protect the data. Which of the following types of interoperability agreement is this? A. ISA B. MOU C. SLA D. BPA Answer: A QUESTION: 200 86
Which of the following solutions provides the most flexibility when testing new security controls prior to implementation? A. Trusted OS B. Host software baselining C. OS hardening D. Virtualization QUESTION: 201 Which of the following authentication services requires the use of a ticket-granting ticket (TGT) server in order to complete the authentication process? A. TACACS+ B. Secure LDAP C. RADIUS D. Kerberos QUESTION: 202 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols? A. TCP/IP B. SSL C. SCP D. SSH Answer: B QUESTION: 203 87
A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO s requirements? A. Username and password B. Retina scan and fingerprint scan C. USB token and PIN D. Proximity badge and token Answer: C QUESTION: 204 Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended? A. Screen lock B. Voice encryption C. GPS tracking D. Device encryption Answer: A QUESTION: 205 Which of the following would a security administrator implement in order to identify a problem between two systems that are not communicating properly? A. Protocol analyzer B. Baseline report C. Risk assessment D. Vulnerability scan Answer: A 88
QUESTION: 206 Which of the following can result in significant administrative overhead from incorrect reporting? A. Job rotation B. Acceptable usage policies C. False positives D. Mandatory vacations Answer: C QUESTION: 207 A security administrator wants to perform routine tests on the network during working hours when certain applications are being accessed by the most people. Which of the following would allow the security administrator to test the lack of security controls for those applications with the least impact to the system? A. Penetration test B. Vulnerability scan C. Load testing D. Port scanner Answer: B QUESTION: 208 Which of the following risk concepts requires an organization to determine the number of failures per year? A. SLE B. ALE C. MTBF D. Quantitative analysis Answer: B 89
QUESTION: 209 Please be aware that if you do not accept these terms you will not be allowed to take this CompTIA exam and you will forfeit the fee paid. A. RETURN TO EXAM B. EXIT EXAM Answer: A QUESTION: 210 Three of the primary security control types that can be implemented are. A. supervisory, subordinate, and peer. B. personal, procedural, and legal. C. operational, technical, and management. D. mandatory, discretionary, and permanent. Answer: C QUESTION: 211 The helpdesk reports increased calls from clients reporting spikes in malware infections on their systems. Which of the following phases of incident response is MOST appropriate as a FIRST response? A. Recovery B. Follow-up C. Validation D. Identification E. Eradication F. Containment 90
For More exams visit https://killexams.com Kill your exam at First Attempt...Guaranteed!