[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 281-290

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 281 – (Topic 2)

Which of the following provides the LEAST availability?

  1. RAID 0

  2. RAID 1

  3. RAID 3

  4. RAID 5

Answer: A Explanation:

RAID, or redundant array of independent disks (RAID). RAID allows your existing servers

to have more than one hard drive so that if the main hard drive fails, the system keeps functioning. RAID 0 is disk striping. It uses multiple drives and maps them together as a single physical drive. This is done primarily for performance, not for fault tolerance. If any drive in a RAID 0 array fails, the entire logical drive becomes unusable.

Question No: 282 – (Topic 2)

Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to restore those services?

  1. Hot site

  2. Warm site

  3. Cold site

  4. Mobile site

Answer: D Explanation:

Not having a dedicated site means that the mobile site can fill the role of either being a hot, warm or cold site as a disaster recovery measure.

Question No: 283 – (Topic 2)

A network administrator has purchased two devices that will act as failovers for each other. Which of the following concepts does this BEST illustrate?

  1. Authentication

  2. Integrity

  3. Confidentiality

  4. Availability

Answer: D Explanation:

Failover refers to the process of reconstructing a system or switching over to other systems when a failure is detected. In the case of a server, the server switches to a redundant server when a fault is detected. This strategy allows service to continue uninterrupted until

the primary server can be restored. In the case of a network, this means processing switches to another network path in the event of a network failure in the primary path. This means availability.

Question No: 284 – (Topic 2)

Joe, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Joe insisted that he was not aware of any company policy that prohibits the use of such web sites. Which of the following is the BEST method to deter employees from the improper use of the company’s information systems?

  1. Acceptable Use Policy

  2. Privacy Policy

  3. Security Policy

  4. Human Resource Policy

Answer: A Explanation:

Acceptable use policies (AUPs) describe how the employees in an organization can use company systems and resources, both software and hardware.

Question No: 285 – (Topic 2)

An incident response team member needs to perform a forensics examination but does not have the required hardware. Which of the following will allow the team member to perform the examination with minimal impact to the potential evidence?

  1. Using a software file recovery disc

  2. Mounting the drive in read-only mode

  3. Imaging based on order of volatility

  4. Hashing the image after capture

Answer: B Explanation:

Mounting the drive in read-only mode will prevent any executable commands from being executed. This is turn will have the least impact on potential evidence using the drive in


Question No: 286 – (Topic 2)

Several employees submit the same phishing email to the administrator. The administrator finds that the links in the email are not being blocked by the company’s security device.

Which of the following might the administrator do in the short term to prevent the emails from being received?

  1. Configure an ACL

  2. Implement a URL filter

  3. Add the domain to a block list

  4. Enable TLS on the mail server

Answer: C Explanation:

Blocking e-mail is the same as preventing the receipt of those e-mails and this is done by applying a filter. But the filter must be configured to block it. Thus you should add that specific domain from where the e-mails are being sent to the list of addresses that is to be blocked.

Question No: 287 – (Topic 2)

Elastic cloud computing environments often reuse the same physical hardware for multiple customers over time as virtual machines are instantiated and deleted. This has important implications for which of the following data security concerns?

  1. Hardware integrity

  2. Data confidentiality

  3. Availability of servers

  4. Integrity of data

Answer: B Explanation:

Data that is not kept separate or segregated will impact on that data’s confidentiality maybe being compromised. Be aware of the fact that your data is only as safe as the data with

which it is integrated. For example, assume that your client database is hosted on a server that another company is also using to test an application that they are creating. If their application obtains root-level access at some point (such as to change passwords) and crashes at that point, then the user running the application could be left with root permissions and conceivably be to access data on the server for which they are not authorized, such as your client database. Data segregation is crucial; keep your data on secure servers.

Question No: 288 – (Topic 2)

In the case of a major outage or business interruption, the security office has documented the expected loss of earnings, potential fines and potential consequence to customer service. Which of the following would include the MOST detail on these objectives?

  1. Business Impact Analysis

  2. IT Contingency Plan

  3. Disaster Recovery Plan

  4. Continuity of Operations

Answer: A Explanation:

Business impact analysis (BIA) is the process of evaluating all of the critical systems in an organization to define impact and recovery plans. BIA isn’t concerned with external threats or vulnerabilities; the analysis focuses on the impact a loss would have on the organization. A BIA comprises the following: identifying critical functions, prioritizing critical business functions, calculating a timeframe for critical systems loss, and estimating the tangible impact on the organization.

Question No: 289 – (Topic 2)

Company A submitted a bid on a contract to do work for Company B via email. Company B was insistent that the bid did not come from Company A. Which of the following would have assured that the bid was submitted by Company A?

  1. Steganography

  2. Hashing

  3. Encryption

  4. Digital Signatures

Answer: D Explanation:

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. The message is encrypted using the encryption system, and a second piece of information, the digital signature, is added to the message.

Question No: 290 – (Topic 2)

An advantage of virtualizing servers, databases, and office applications is:

  1. Centralized management.

  2. Providing greater resources to users.

  3. Stronger access control.

  4. Decentralized management.

Answer: A Explanation:

Virtualization consists of allowing one set of hardware to host multiple virtual Machines and in the case of software and applications; one host is all that is required. This makes centralized management a better prospect.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com