[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 341-350

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 341 – (Topic 2)

The manager has a need to secure physical documents every night, since the company began enforcing the clean desk policy. The BEST solution would include: (Select TWO).

  1. Fire- or water-proof safe.

  2. Department door locks.

  3. Proximity card.

  4. 24-hour security guard.

  5. Locking cabinets and drawers.

Answer: A,E Explanation:

Using a safe and locking cabinets to protect backup media, documentation, and any other physical artifacts that could do harm if they fell into the wrong hands would form part of keeping employees desks clean as in a clean desk policy.

Question No: 342 – (Topic 2)

A company is installing a new security measure that would allow one person at a time to be authenticated to an area without human interaction. Which of the following does this describe?

  1. Fencing

  2. Mantrap

  3. A guard

  4. Video surveillance

Answer: B Explanation:

Mantraps make use of electronic locks and are designed to allow you to limit the amount of individual allowed access to an area at any one time.

Question No: 343 – (Topic 2)

Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privilege principles?

  1. User rights reviews

  2. Incident management

  3. Risk based controls

  4. Annual loss expectancy

Answer: A Explanation:

A least privilege policy should be used when assigning permissions. Give users only the permissions and rights that they need to do their work and no more.

Question No: 344 – (Topic 2)

Which of the following could a security administrator implement to mitigate the risk of tailgating for a large organization?

  1. Train employees on correct data disposal techniques and enforce policies.

  2. Only allow employees to enter or leave through one door at specified times of the day.

  3. Only allow employees to go on break one at a time and post security guards 24/7 at each entrance.

  4. Train employees on risks associated with social engineering attacks and enforce policies.

Answer: D Explanation:

Tailgating is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, a card, or any other security device. Many social engineering intruders needing physical access to a site will use this method of gaining entry. Educate users to beware of this and other social engineering ploys and prevent them from happening.

Question No: 345 – (Topic 2)

A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at the site were facing the wrong direction to capture the incident. The analyst ensures the cameras are turned to face the proper direction. Which of the following types of controls is being used?

  1. Detective

  2. Deterrent

  3. Corrective

  4. Preventive

Answer: C Explanation:

A corrective control would be any corrective action taken to correct any existing control that were faulty or wrongly installed – as in this case the cameras were already there, it just had to be adjusted to perform its function as intended.

Question No: 346 – (Topic 2)

Which of the following is the BEST reason to provide user awareness and training programs for organizational staff?

  1. To ensure proper use of social media

  2. To reduce organizational IT risk

  3. To detail business impact analyses

  4. To train staff on zero-days

Answer: B Explanation:

Ideally, a security awareness training program for the entire organization should cover the following areas:

Importance of security

Responsibilities of people in the organization Policies and procedures

Usage policies

Account and password-selection criteria Social engineering prevention

You can accomplish this training either by using internal staff or by hiring outside trainers. This type of training will significantly reduce the organizational IT risk.

Question No: 347 – (Topic 2)

Which of the following defines a business goal for system restoration and acceptable data loss?

  1. MTTR

  2. MTBF

  3. RPO

  4. Warm site

Answer: C Explanation:

The recovery point objective (RPO) defines the point at which the system needs to be restored. This could be where the system was two days before it crashed (whip out the old backup tapes) or five minutes before it crashed (requiring complete redundancy). This is an essential business goal insofar as system restoration and acceptable data loss is concerned.

Question No: 348 – (Topic 2)

Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify that the email came from Joe and decrypt it? (Select TWO).

  1. The CA’s public key

  2. Ann’s public key

  3. Joe’s private key

  4. Ann’s private key

  5. The CA’s private key

  6. Joe’s public key

Answer: D,F Explanation:

Joe wants to send a message to Ann. It’s important that this message not be altered. Joe will use the private key to create a digital signature. The message is, in effect, signed with the private key. Joe then sends the message to Ann. Ann will use the public key attached to the message to validate the digital signature. If the values match, Ann knows the message is authentic and came from Joe. Ann will use a key provided by Joe-the public key-to decrypt the message. Most digital signature implementations also use a hash to verify that the message has not been altered, intentionally or accidently, in transit. Thus Ann would compare the signature area referred to as a message in the message with the calculated value digest (her private key in this case). If the values match, the message

hasn’t been tampered with and the originator is verified as the person they claim to be.

Question No: 349 – (Topic 2)

When a new network drop was installed, the cable was run across several fluorescent lights. The users of the new network drop experience intermittent connectivity. Which of the following environmental controls was MOST likely overlooked during installation?

  1. Humidity sensors

  2. EMI shielding

  3. Channel interference

  4. Cable kinking

Answer: B Explanation:

Shielding refers to the process of preventing electronic emissions from your computer systems from being used to gather intelligence and preventing outside electronic emissions from disrupting your information-processing abilities. In this case you are experiencing intermittent connectivity since Electro Magnetic Interference (EMI) was not taken into account when running the cables over fluorescent lighting.

Question No: 350 – (Topic 2)

Which of the following concepts allows an organization to group large numbers of servers together in order to deliver a common service?

  1. Clustering

  2. RAID

  3. Backup Redundancy

  4. Cold site

Answer: A Explanation:

Anytime you connect multiple computers to work/act together as a single server, it is known as clustering. Clustered systems utilize parallel processing (improving performance and availability) and add redundancy (but also add costs).

Clustering is done whenever you connect multiple computers to work and act together as a single server. It is meant to utilize parallel processing and can also add to redundancy.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com