Vcehome > CompTIA > CompTIA Security+ > JK0-022 > JK0-022 Online Practice Questions and Answers

JK0-022 Online Practice Questions and Answers

Questions 4

A network administrator wants to block both DNS requests and zone transfers coming from outside IP addresses. The company uses a firewall which implements an implicit allow and is currently configured with the following ACL applied to its external interface.

PERMIT TCP ANY ANY 80 PERMIT TCP ANY ANY 443

Which of the following rules would accomplish this task? (Select TWO).

A. Change the firewall default settings so that it implements an implicit deny

B. Apply the current ACL to all interfaces of the firewall

C. Remove the current ACL

D. Add the following ACL at the top of the current ACL DENY TCP ANY ANY 53

E. Add the following ACL at the bottom of the current ACL DENY ICMP ANY ANY 53

F. Add the following ACL at the bottom of the current ACL DENY IP ANY ANY 53

Browse 1149 Q&As
Questions 5

Pete, a security engineer, is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally, the MAC addresses of all five servers appear on the same switch port. Which of the following is MOST likely the cause?

A. The system is running 802.1x.

B. The system is using NAC.

C. The system is in active-standby mode.

D. The system is virtualized.

Browse 1149 Q&As
Questions 6

Which of the following describes the purpose of an MOU?

A. Define interoperability requirements

B. Define data backup process

C. Define onboard/offboard procedure

D. Define responsibilities of each party

Browse 1149 Q&As
Questions 7

A security administrator plans on replacing a critical business application in five years. Recently, there was a security flaw discovered in the application that will cause the IT department to manually re-enable user accounts each month at a cost of $2,000. Patching the application today would cost $140,000 and take two months to implement. Which of the following should the security administrator do in regards to the application?

A. Avoid the risk to the user base allowing them to re-enable their own accounts

B. Mitigate the risk by patching the application to increase security and saving money

C. Transfer the risk replacing the application now instead of in five years

D. Accept the risk and continue to enable the accounts each month saving money

Browse 1149 Q&As
Questions 8

The system administrator has deployed updated security controls for the network to limit risk of attack. The security manager is concerned that controls continue to function as intended to maintain appropriate security posture.

Which of the following risk mitigation strategies is MOST important to the security manager?

A. User permissions

B. Policy enforcement

C. Routine audits

D. Change management

Browse 1149 Q&As
Questions 9

Which of the following malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-ups based on browsing habits?

A. Botnet

B. Rootkit

C. Adware

D. Virus

Browse 1149 Q&As
Questions 10

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?

A. Interference

B. Man-in-the-middle

C. ARP poisoning

D. Rogue access point

Browse 1149 Q&As
Questions 11

A malicious individual is attempting to write too much data to an application's memory. Which of the following describes this type of attack?

A. Zero-day

B. SQL injection

C. Buffer overflow

D. XSRF

Browse 1149 Q&As
Questions 12

Which of the following is BEST utilized to actively test security controls on a particular system?

A. Port scanning

B. Penetration test

C. Vulnerability scanning

D. Grey/Gray box

Browse 1149 Q&As
Questions 13

Which of the following pseudocodes can be used to handle program exceptions?

A. If program detects another instance of itself, then kill program instance.

B. If user enters invalid input, then restart program.

C. If program module crashes, then restart program module.

D. If user's input exceeds buffer length, then truncate the input.

Browse 1149 Q&As
Exam Code: JK0-022
Exam Name: CompTIA Security+ Certification
Last Update: Apr 19, 2024
Questions: 1149 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99