[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 241-250

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 241 – (Topic 2)

A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents. Which of the following would be the BEST technology control to use in this scenario?

  1. Content filtering

  2. IDS

  3. Audit logs

  4. DLP

Answer: D Explanation:

Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

Question No: 242 – (Topic 2)

Which of the following would a security administrator use to verify the integrity of a file?

  1. Time stamp

  2. MAC times

  3. File descriptor

  4. Hash

Answer: D Explanation:

Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash tables and it is a one-way transformation in order to validate the integrity of data.

Question No: 243 – (Topic 2)

Which of the following is a management control?

  1. Logon banners

  2. Written security policy

  3. SYN attack prevention

  4. Access Control List (ACL)

Answer: B Explanation:

Management control types include risk assessment, planning, systems and Services Acquisition as well as Certification, Accreditation and Security Assessment; and written security policy falls in this category.

Question No: 244 – (Topic 2)

Which of the following is an example of a false negative?

  1. The IDS does not identify a buffer overflow.

  2. Anti-virus identifies a benign application as malware.

  3. Anti-virus protection interferes with the normal operation of an application.

  4. A user account is locked out after the user mistypes the password too many times.

Answer: A Explanation:

With a false negative, you are not alerted to a situation when you should be alerted.

Question No: 245 – (Topic 2)

Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network?

  1. Cross-platform compatibility issues between personal devices and server-based applications

  2. Lack of controls in place to ensure that the devices have the latest system patches and signature files

  3. Non-corporate devices are more difficult to locate when a user is terminated

  4. Non-purchased or leased equipment may cause failure during the audits of company- owned assets

Answer: B Explanation:

With employees who want to bring their own devices you will have to make them understand why they cannot. You do not want them plugging in a flash drive, let alone a camera, smartphone, tablet computer, or other device, on which company fi les could get intermingled with personal files. Allowing this to happen can create situations where data can leave the building that shouldn’t as well as introduce malware to the system.

Employees should not sync unauthorized smartphones to their work systems. Some smartphones use multiple wireless spectrums and unwittingly open up the possibility for an attacker in the parking lot to gain access through the phone to the internal network. Thus if you do not have controls in place then your network is definitely at risk.

Question No: 246 – (Topic 2)

Two members of the finance department have access to sensitive information. The company is concerned they may work together to steal information. Which of the following controls could be implemented to discover if they are working together?

  1. Least privilege access

  2. Separation of duties

  3. Mandatory access control

  4. Mandatory vacations

Answer: D Explanation:

A mandatory vacation policy requires all users to take time away from work to refresh. Mandatory vacation give the employee a chance to refresh, but it also gives the company a chance to make sure that others can fill in any gaps in skills and satisfies the need to have replication or duplication at all levels. Mandatory vacations also provide an opportunity to discover fraud. In this case mandatory vacations can prevent the two members from colluding to steal the information that they have access to.

Question No: 247 – (Topic 2)

Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Pete’s BEST option?

  1. Use hardware already at an offsite location and configure it to be quickly utilized.

  2. Move the servers and data to another part of the company’s main campus from the server room.

  3. Retain data back-ups on the main campus and establish redundant servers in a virtual environment.

  4. Move the data back-ups to the offsite location, but retain the hardware on the main campus for redundancy.

Answer: A Explanation:

A warm site provides some of the capabilities of a hot site, but it requires the customer to do more work to become operational. Warm sites provide computer systems and compatible media capabilities. If a warm site is used, administrators and other staff will need to install and configure systems to resume operations. For most organizations, a warm site could be a remote office, a leased facility, or another organization with which yours has a reciprocal agreement.

Warm sites may be for your exclusive use, but they don’t have to be. A warm site requires more advanced planning, testing, and access to media for system recovery. Warm sites represent a compromise between a hot site, which is very expensive, and a cold site, which

isn’t preconfigured.

Question No: 248 – (Topic 2)

Customers’ credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future?

  1. Application firewalls

  2. Manual updates

  3. Firmware version control

  4. Encrypted TCP wrappers

Answer: D Explanation:

Wrapping sensitive systems with a specific control is required when protecting data in transit. TCP wrappers are also security controls. TCP Wrapper is a host-based networking ACL system, used to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows host or subnetwork IP addresses, names and/or inetd query replies, to be used as tokens on which to filter for access control purposes.

TCP Wrapper should not be considered a replacement for a properly configured firewall. Instead, TCP Wrapper should be used in conjunction with a firewall and other security enhancements in order to provide another layer of protection in the implementation of a security policy.

Question No: 249 – (Topic 2)

Which of the following would BEST be used to calculate the expected loss of an event, if the likelihood of an event occurring is known? (Select TWO).

  1. DAC

  2. ALE

  3. SLE

  4. ARO

  5. ROI

Answer: B,C Explanation:

ALE (Annual Loss Expectancy) is equal to the SLE (Single Loss Expectancy) times the annualized rate of occurrence. SLE (Single Loss Expectancy) is equal to asset value (AV) times exposure factor (EF).

Question No: 250 – (Topic 2)

Joe, the system administrator, is performing an overnight system refresh of hundreds of user computers. The refresh has a strict timeframe and must have zero downtime during business hours. Which of the following should Joe take into consideration?

  1. A disk-based image of every computer as they are being replaced.

  2. A plan that skips every other replaced computer to limit the area of affected users.

  3. An offsite contingency server farm that can act as a warm site should any issues appear.

  4. A back-out strategy planned out anticipating any unforeseen problems that may arise.

Answer: D Explanation:

A backout is a reversion from a change that had negative consequences. It could be, for example, that everything was working fine until you installed a service pack on a production machine, and then services that were normally available were no longer accessible. The backout, in this instance, would revert the system to the state that it was in before the service pack was applied.

Backout plans can include uninstalling service packs, hotfixes, and patches, but they can also include reversing a migration and using previous firmware. A key component to creating such a plan is identifying what events will trigger your implementing the backout.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com