[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 261-270

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 261 – (Topic 2)

Corporate IM presents multiple concerns to enterprise IT. Which of the following concerns should Jane, the IT security manager, ensure are under control? (Select THREE).

  1. Authentication

  2. Data leakage

  3. Compliance

  4. Malware

  5. Non-repudiation

  6. Network loading

Answer: B,C,D Explanation:

In a joint enterprise, data may be combined from both organizations. It must be determined, in advance, who is responsible for that data and how the data backups will be managed.

Data leakage, compliance and Malware issues are all issues concerning data ownership and backup which are both impacted on by corporate IM.

Question No: 262 – (Topic 2)

Users can authenticate to a company’s web applications using their credentials from a popular social media site. Which of the following poses the greatest risk with this integration?

  1. Malicious users can exploit local corporate credentials with their social media credentials

  2. Changes to passwords on the social media site can be delayed from replicating to the company

  3. Data loss from the corporate servers can create legal liabilities with the social media site

  4. Password breaches to the social media site affect the company application as well

Answer: D Explanation:

Social networking and having you company’s application authentication ‘linked’ to users’ credential that they use on social media sites exposes your company’s application exponentially more than is necessary. You should strive to practice risk avoidance.

Question No: 263 – (Topic 2)

Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days’ hashes. Which of the following security concepts is Sara using?

  1. Confidentiality

  2. Compliance

  3. Integrity

  4. Availability

Answer: C Explanation:

Integrity means the message can’t be altered without detection.

Question No: 264 – (Topic 2)

A network administrator has recently updated their network devices to ensure redundancy is in place so that:

  1. switches can redistribute routes across the network.

  2. environmental monitoring can be performed.

  3. single points of failure are removed.

  4. hot and cold aisles are functioning.

Answer: C Explanation:

Redundancy refers to systems that either are duplicated or fail over to other systems in the event of a malfunction. The best way to remove an SPOF from your environment is to add redundancy.

Question No: 265 – (Topic 2)

A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security controls?

  1. Integrity

  2. Availability

  3. Confidentiality

  4. Safety

Answer: D Explanation:

Fencing is used to increase physical security and safety. Locks are used to keep those who are unauthorized out.

Question No: 266 – (Topic 2)

Ann a technician received a spear-phishing email asking her to update her personal information by clicking the link within the body of the email. Which of the following type of training would prevent Ann and other employees from becoming victims to such attacks?

  1. User Awareness

  2. Acceptable Use Policy

  3. Personal Identifiable Information

  4. Information Sharing

Answer: C Explanation:

Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card number, or patient record. Employees should be made aware of this type of attack by means of training.

Question No: 267 – (Topic 2)

The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following?

  1. Rainbow tables attacks

  2. Brute force attacks

  3. Birthday attacks

  4. Cognitive passwords attacks

Answer: D Explanation:

Social Networking Dangers are ‘amplified’ in that social media networks are designed to mass distribute personal messages. If an employee reveals too much personal information it would be easy for miscreants to use the messages containing the personal information to work out possible passwords.

Question No: 268 – (Topic 2)

A major security risk with co-mingling of hosts with different security requirements is:

  1. Security policy violations.

  2. Zombie attacks.

  3. Password compromises.

  4. Privilege creep.

Answer: A Explanation:

The entire network is only as strong as the weakest host. Thus with the co-mingling of hosts with different security requirements would be risking security policy violations.

Question No: 269 – (Topic 2)

A company replaces a number of devices with a mobile appliance, combining several functions.

Which of the following descriptions fits this new implementation? (Select TWO).

  1. Cloud computing

  2. Virtualization

  3. All-in-one device

  4. Load balancing

  5. Single point of failure

Answer: C,E Explanation:

The disadvantages of combining everything into one include a potential single point of failure, and the dependence on the one vendor. The all -in-one device represents a single point of failure risk being taken on.

Question No: 270 – (Topic 2)

Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?

  1. Record time offset

  2. Clean desk policy

  3. Cloud computing

  4. Routine log review

Answer: B Explanation:

Clean Desk Policy Information on a desk-in terms of printouts, pads of note paper, sticky notes, and the like-can be easily seen by prying eyes and taken by thieving hands. To protect data and your business, encourage employees to maintain clean desks and to leave out only those papers that are relevant to the project they are working on at that moment. All sensitive information should be put away when the employee is away from their desk. This will mitigate the risk of data loss when applied.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com