[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 181-190

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 181 – (Topic 2)

Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?

  1. Installing anti-malware

  2. Implementing an IDS

  3. Taking a baseline configuration

  4. Disabling unnecessary services

Answer: D Explanation:

Preventive controls are to stop something from happening. These can include locked doors that keep intruders out, user training on potential harm (to keep them vigilant and alert), or even biometric devices and guards that deny access until authentication has occurred. By disabling all unnecessary services you would be reducing the attack surface because then there is less opportunity for risk incidents to happen. There are many risks with having many services enabled since a service can provide an attack vector that someone could exploit against your system. It is thus best practice to enable only those services that are absolutely required.

Question No: 182 – (Topic 2)

Which of the following security account management techniques should a security analyst implement to prevent staff, who has switched company roles, from exceeding privileges?

  1. Internal account audits

  2. Account disablement

  3. Time of day restriction

  4. Password complexity

Answer: A Explanation:

Internal account auditing will allow you to switch the appropriate users to the proper accounts required after the switching of roles occurred and thus check that the principle of least privilege is followed.

Question No: 183 – (Topic 2)

The security administrator is currently unaware of an incident that occurred a week ago. Which of the following will ensure the administrator is notified in a timely manner in the future?

  1. User permissions reviews

  2. Incident response team

  3. Change management

  4. Routine auditing

Answer: D Explanation:

Routine audits are carried out after you have implemented security controls based on risk. These audits include aspects such as user rights and permissions and specific events.

Question No: 184 – (Topic 2)

Digital certificates can be used to ensure which of the following? (Select TWO).

  1. Availability

  2. Confidentiality

  3. Verification

  4. Authorization

  5. Non-repudiation

Answer: B,E Explanation:

Digital Signatures is used to validate the integrity of the message and the sender. Digital certificates refer to cryptography which is mainly concerned with Confidentiality, Integrity, Authentication, Nonrepudiation and Access Control. Nonrepudiation prevents one party from denying actions they carried out.

Question No: 185 – (Topic 2)

A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server’s drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO? (Select TWO).

  1. Disk hashing procedures

  2. Full disk encryption

  3. Data retention policies

  4. Disk wiping procedures

  5. Removable media encryption

Answer: B,D Explanation:

B: Full disk encryption is when the entire volume is encrypted; the data is not accessible to someone who might boot another operating system in an attempt to bypass the computer’s security. Full disk encryption is sometimes referred to as hard drive encryption.

D: Disk wiping is the process of overwriting data on the repeatedly, or using a magnet to alter the magnetic structure of the disks. This renders the data unreadable.

Question No: 186 – (Topic 2)

Which of the following is an attack vector that can cause extensive physical damage to a datacenter without physical access?

  1. CCTV system access

  2. Dial-up access

  3. Changing environmental controls

  4. Ping of death

Answer: C Explanation:

Environmental systems include heating, air conditioning, humidity control, fire suppression, and power systems. All of these functions are critical to a well-designed physical plant. A computer room will typically require full-time environmental control. Changing any of these controls (when it was set to its optimum values) will result in damage.

Question No: 187 – (Topic 2)

Which of the following is an effective way to ensure the BEST temperature for all equipment within a datacenter?

  1. Fire suppression

  2. Raised floor implementation

  3. EMI shielding

  4. Hot or cool aisle containment

Answer: D


There are often multiple rows of servers located in racks in server rooms. The rows of servers are known as aisles, and they can be cooled as hot aisles and cold aisles. With a hot aisle, hot air outlets are used to cool the equipment, whereas with cold aisles, cold air intake is used to cool the equipment. Combining the two, you have cold air intake from below the aisle and hot air outtake above it, providing constant circulation. This is a more effective way of controlling temperature to safeguard your equipment in a data center.

Question No: 188 – (Topic 2)

Identifying residual risk is MOST important to which of the following concepts?

  1. Risk deterrence

  2. Risk acceptance

  3. Risk mitigation

  4. Risk avoidance

Answer: B Explanation:

Risk acceptance is often the choice you must make when the cost of implementing any of the other four choices exceeds the value of the harm that would occur if the risk came to fruition. To truly qualify as acceptance, it cannot be a risk where the administrator or manager is unaware of its existence; it has to be an identified risk for which those involved understand the potential cost or damage and agree to accept it. Residual risk is always present and will remain a risk thus it should be accepted (risk acceptance)

Question No: 189 – (Topic 2)

A security administrator is tasked with calculating the total ALE on servers. In a two year period of time, a company has to replace five servers. Each server replacement has cost the company $4,000 with downtime costing $3,000. Which of the following is the ALE for the company?

A. $7,000 B. $10,000 C. $17,500

D. $35,000

Answer: C Explanation:

SLE 脳 ARO = ALE, where SLE is equal to asset value (AV) times exposure factor (EF); and ARO is the annualized rate of occurrence.

SLE =($4000 $3000) x 5 = $35000

ARO = 2 years Thus per year it would be 50% = 0,5 The ALE is thus $35000 x 0.5 = $17500

Question No: 190 – (Topic 2)

Which of the following provides the BEST application availability and is easily expanded as demand grows?

  1. Server virtualization

  2. Load balancing

  3. Active-Passive Cluster

  4. RAID 6

Answer: B Explanation:

Load balancing is a way of providing high availability by splitting the workload across multiple computers.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com