[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 421-430

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 421 – (Topic 2)

Which of the following is a security benefit of providing additional HVAC capacity or increased tonnage in a datacenter?

  1. Increased availability of network services due to higher throughput

  2. Longer MTBF of hardware due to lower operating temperatures

  3. Higher data integrity due to more efficient SSD cooling

  4. Longer UPS run time due to increased airflow

Answer: B Explanation:

The mean time between failures (MTBF) is the measure of the anticipated incidence of failure for a system or component. This measurement determines the component’s anticipated lifetime. If the MTBF of a cooling system is one year, you can anticipate that the system will last for a one-year period; this means that you should be prepared to replace or rebuild the system once a year. If the system lasts longer than the MTBF, your organization receives a bonus. MTBF is helpful in evaluating a system’s reliability and life expectancy.

Thus longer MTBF due to lower operating temperatures is a definite advantage

Question No: 422 – (Topic 2)

A recent intrusion has resulted in the need to perform incident response procedures. The incident response team has identified audit logs throughout the network and organizational

systems which hold details of the security breach. Prior to this incident, a security consultant informed the company that they needed to implement an NTP server on the network. Which of the following is a problem that the incident response team will likely encounter during their assessment?

  1. Chain of custody

  2. Tracking man hours

  3. Record time offset

  4. Capture video traffic

Answer: C Explanation:

It is quite common for workstation as well as server times to be off slightly from actual time. Since a forensic investigation is usually dependent on a step-by-step account of what has happened, being able to follow events in the correct time sequence is critical. Because of this, it is imperative to record the time offset on each affected machine during the investigation. One method of assisting with this is to add an entry to a log file and note the time that this was done and the time associated with it on the system. There is no mention that this was done by the incident response team.

Question No: 423 – (Topic 2)

To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?

  1. Management

  2. Administrative

  3. Technical

  4. Operational

Answer: C Explanation:

controls such as preventing unauthorized access to PC’s and applying screensavers that lock the PC after five minutes of inactivity is a technical control type, the same as Identification and Authentication, Access Control, Audit and Accountability as well as System and Communication Protection.

Question No: 424 – (Topic 2)

Joe, a security administrator, is concerned with users tailgating into the restricted areas. Given a limited budget, which of the following would BEST assist Joe with detecting this activity?

  1. Place a full-time guard at the entrance to confirm user identity.

  2. Install a camera and DVR at the entrance to monitor access.

  3. Revoke all proximity badge access to make users justify access.

  4. Install a motion detector near the entrance.

Answer: B Explanation:

Tailgating is a favorite method of gaining entry to electronically locked systems by following someone through the door they just unlocked. With a limited budget installing a camera and DVR at the entrance to monitor access to the restricted areas is the most feasible solution. The benefit of a camera (also known as closed-circuit television, or CCTV) is that it is always running and can record everything it sees, creating evidence that can be admissible in court if necessary.

Question No: 425 – (Topic 2)

What is the term for the process of luring someone in (usually done by an enforcement officer or a government agent)?

  1. Enticement

  2. Entrapment

  3. Deceit

  4. Sting

Answer: A Explanation:

Enticement is the process of luring someone into your plan or trap.

Question No: 426 – (Topic 2)

A malicious person gained access to a datacenter by ripping the proximity badge reader off the wall near the datacenter entrance. This caused the electronic locks on the datacenter door to release because the:

  1. badge reader was improperly installed.

  2. system was designed to fail open for life-safety.

  3. system was installed in a fail closed configuration.

  4. system used magnetic locks and the locks became demagnetized.

Answer: B Explanation:

It describes a design the lock to fail open for life safety, causing the door to stay open when power is lost – in this case the proximity badge reader was ripped off the wall.

Question No: 427 DRAG DROP – (Topic 2)

You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan.

Instructions: All objects must be used and all place holders must be filled. Order does not matter. When you have completed the simulation, please select the Done button to submit.

Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE


Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-07-28 at 4.09.08 PM.png


Dulaney, Emmett and Chuck Eastton, CompTIA Security Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, p 369

Question No: 428 – (Topic 2)

Visitors entering a building are required to close the back door before the front door of the same entry room is open. Which of the following is being described?

  1. Tailgating

  2. Fencing

  3. Screening

  4. Mantrap

Answer: D Explanation:

Mantraps are designed to contain an unauthorized, potentially hostile person/individual physically until authorities arrive. Mantraps are typically manufactured with bulletproof glass, high-strength doors, and locks and to allow the minimal amount of individuals depending on its size. Some mantraps even include scales that will weigh the person. The doors are designed in such a way as to open only when the mantrap is occupied or empty and not in-between. This means that the backdoor must first close before the front door will open; exactly what is required in this scenario.

Question No: 429 – (Topic 2)

Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach?

A. $1,500 B. $3,750 C. $15,000

D. $75,000

Answer: B Explanation:

SLE 脳 ARO = ALE, where SLE is equal to asset value (AV) times exposure factor (EF); and ARO is the annualized rate of occurrence.

SLE = 250 x $300; ARO = 5%

$75000 x 0.05 = $3750

Question No: 430 – (Topic 2)

Which of the following is the MOST specific plan for various problems that can arise within a system?

  1. Business Continuity Plan

  2. Continuity of Operation Plan

  3. Disaster Recovery Plan

  4. IT Contingency Plan

Answer: D Explanation:

An IT contingency plan would focus on the IT aspect in particular to ensure business continuity.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com