[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 351-360

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 351 – (Topic 2)

Computer evidence at a crime scene is documented with a tag stating who had possession of the evidence at a given time.

Which of the following does this illustrate?

  1. System image capture

  2. Record time offset

  3. Order of volatility

  4. Chain of custody

Answer: D Explanation:

Chain of custody deals with how evidence is secured, where it is stored, and who has access to it. When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been.

Question No: 352 – (Topic 2)

To ensure proper evidence collection, which of the following steps should be performed FIRST?

  1. Take hashes from the live system

  2. Review logs

  3. Capture the system image

  4. Copy all compromised files

Answer: C Explanation:

Capturing an image of the operating system in its exploited state can be helpful in revisiting the issue after the fact to learn more about it. This is essential since the collection of evidence process may result in some mishandling and changing the exploited state.

Question No: 353 – (Topic 2)

Which of the following types of risk reducing policies also has the added indirect benefit of cross training employees when implemented?

  1. Least privilege

  2. Job rotation

  3. Mandatory vacations

  4. Separation of duties

Answer: B Explanation:

A job rotation policy defines intervals at which employees must rotate through positions. Similar in purpose to mandatory vacations, it helps to ensure that the company does not become too dependent on one person and it does afford the company with the opportunity to place another person in that same job.

Question No: 354 – (Topic 2)

Due to issues with building keys being duplicated and distributed, a security administrator wishes to change to a different security control regarding a restricted area. The goal is to provide access based upon facial recognition. Which of the following will address this requirement?

  1. Set up mantraps to avoid tailgating of approved users.

  2. Place a guard at the entrance to approve access.

  3. Install a fingerprint scanner at the entrance.

  4. Implement proximity readers to scan users’ badges.

Answer: B Explanation:

A guard can be instructed to deny access until authentication has occurred will address the situation adequately.

Question No: 355 – (Topic 2)

A datacenter requires that staff be able to identify whether or not items have been removed from the facility. Which of the following controls will allow the organization to provide automated notification of item removal?

  1. CCTV

  2. Environmental monitoring

  3. RFID

  4. EMI shielding

Answer: C Explanation:

RFID is radio frequency identification that works with readers that work with 13.56 MHz smart cards and 125 kHz proximity cards and can open turnstiles, gates, and any other physical security safeguards once the signal is read. Fitting out the equipment with RFID will allow you to provide automated notification of item removal in the event of any of the equipped items is taken off the premises.

Question No: 356 – (Topic 2)

An organization is recovering data following a datacenter outage and determines that backup copies of files containing personal information were stored in an unsecure location, because the sensitivity was unknown. Which of the following activities should occur to prevent this in the future?

  1. Business continuity planning

  2. Quantitative assessment

  3. Data classification

  4. Qualitative assessment

Answer: C Explanation:

Information classification is done by confidentiality and comprises of three categories, namely: public use, internal use and restricted use. Knowing how to apply these categories and matching it up with the appropriate data handling will address the situation of the data ‘unknown sensitivity’

Question No: 357 – (Topic 2)

Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information. Which of the following will accomplish this task securely?

  1. Digital Signatures

  2. Hashing

  3. Secret Key

  4. Encryption

Answer: D Explanation:

Encryption is used to prevent unauthorized users from accessing data. Data encryption will support the confidentiality of the email.

Question No: 358 – (Topic 2)

Which of the following is BEST carried out immediately after a security breach is discovered?

  1. Risk transference

  2. Access control revalidation

  3. Change management

  4. Incident management

Answer: D Explanation:

Incident management is the steps followed when security incident occurs.

Question No: 359 – (Topic 2)

Which of the following are Data Loss Prevention (DLP) strategies that address data in transit issues? (Select TWO).

  1. Scanning printing of documents.

  2. Scanning of outbound IM (Instance Messaging).

  3. Scanning copying of documents to USB.

  4. Scanning of SharePoint document library.

  5. Scanning of shared drives.

  6. Scanning of HTTP user traffic.

Answer: B,F Explanation:

DLP systems monitor the contents of systems (workstations, servers, networks) to make sure key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data. Outbound IM and HTTP user traffic refers to data over a network which falls within the DLP strategy.

Question No: 360 – (Topic 2)

The Chief Information Officer (CIO) wants to implement a redundant server location to which the production server images can be moved within 48 hours and services can be quickly restored, in case of a catastrophic failure of the primary datacenter’s HVAC. Which of the following can be implemented?

  1. Cold site

  2. Load balancing

  3. Warm site

  4. Hot site

Answer: C Explanation:

Warm sites provide computer systems and compatible media capabilities. If a warm site is used, administrators and other staff will need to install and configure systems to resume operations. For most organizations, a warm site could be a remote office, a leased facility, or another organization with which yours has a reciprocal agreement.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com