[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 321-330

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 321 – (Topic 2)

Which of the following controls would prevent an employee from emailing unencrypted information to their personal email account over the corporate network?

  1. DLP

  2. CRL

  3. TPM

  4. HSM

Answer: A Explanation:

Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data.

Question No: 322 – (Topic 2)

Separation of duties is often implemented between developers and administrators in order to separate which of the following?

  1. More experienced employees from less experienced employees

  2. Changes to program code and the ability to deploy to production

  3. Upper level management users from standard development employees

  4. The network access layer from the application access layer

Answer: B Explanation:

Separation of duties means that there is differentiation between users, employees and duties per se which form part of best practices.

Question No: 323 – (Topic 2)

The system administrator has deployed updated security controls for the network to limit risk of attack. The security manager is concerned that controls continue to function as intended to maintain appropriate security posture.

Which of the following risk mitigation strategies is MOST important to the security manager?

  1. User permissions

  2. Policy enforcement

  3. Routine audits

  4. Change management

Answer: C Explanation:

After you have implemented security controls based on risk, you must perform routine audits. These audits should include reviews of user rights and permissions as well as specific events. You should pay particular attention to false positives and negatives.

Question No: 324 – (Topic 2)

Datacenter access is controlled with proximity badges that record all entries and exits from the datacenter. The access records are used to identify which staff members accessed the data center in the event of equipment theft. Which of the following MUST be prevented in order for this policy to be effective?

  1. Password reuse

  2. Phishing

  3. Social engineering

  4. Tailgating

Answer: D Explanation:

Tailgating is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, a card, or any

other security device. This should be prevented in this case.

Question No: 325 – (Topic 2)

A software developer is responsible for writing the code on an accounting application. Another software developer is responsible for developing code on a system in human resources. Once a year they have to switch roles for several weeks.

Which of the following practices is being implemented?

  1. Mandatory vacations

  2. Job rotation

  3. Least privilege

  4. Separation of duties

Answer: B Explanation:

A job rotation policy defines intervals at which employees must rotate through positions.

Question No: 326 – (Topic 2)

Which of the following results in datacenters with failed humidity controls? (Select TWO).

  1. Excessive EMI

  2. Electrostatic charge

  3. Improper ventilation

  4. Condensation

  5. Irregular temperature

Answer: B,D Explanation:

Humidity control prevents the buildup of static electricity in the environment. If the humidity drops much below 50 percent, electronic components are extremely vulnerable to damage from electrostatic shock. Most environmental systems also regulate humidity; however, a malfunctioning system can cause the humidity to be almost entirely extracted from a room. Make sure that environmental systems are regularly serviced. Electrostatic damage can

occur when humidity levels get too low. Condensation is a direct result from failed humidity levels.

Question No: 327 – (Topic 2)

Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?

  1. Sign in and sign out logs

  2. Mantrap

  3. Video surveillance

  4. HVAC

Answer: B Explanation:

Mantraps are designed to contain an unauthorized, potentially hostile person/individual physically until authorities arrive. Mantraps are typically manufactured with bulletproof glass, high-strength doors, and locks and to allow the minimal amount of individuals depending on its size. Some mantraps even include scales that will weigh the person. The doors are designed in such a way as to open only when the mantrap is occupied or empty and not in-between. This means that the backdoor must first close before the front door will open. Mantraps are in most cases also combined with guards. This is the most physical protection any one measure will provide.

Question No: 328 – (Topic 2)

An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?

  1. CRL

  2. Non-repudiation

  3. Trust models

  4. Recovery agents

Answer: B


Nonrepudiation prevents one party from denying actions they carried out. This means that the identity of the email sender will not be repudiated.

Question No: 329 – (Topic 2)

Upper management decides which risk to mitigate based on cost. This is an example of:

  1. Qualitative risk assessment

  2. Business impact analysis

  3. Risk management framework

  4. Quantitative risk assessment

Answer: D Explanation:

Quantitative analysis / assessment is used to the show the logic and cost savings in replacing a server for example before it fails rather than after the failure. Quantitative assessments assign a dollar amount.

Question No: 330 – (Topic 2)

Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process?

  1. Separation of Duties

  2. Mandatory Vacations

  3. Discretionary Access Control

  4. Job Rotation

Answer: A Explanation:

Separation of duties means that users are granted only the permissions they need to do their work and no more.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com