[Free] 2018(Mar) EnsurePass Pass4sure CompTIA JK0-022 Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 91 – (Topic 1)

Which of the following technologies can store multi-tenant data with different security requirements?

  1. Data loss prevention

  2. Trusted platform module

  3. Hard drive encryption

  4. Cloud computing

Answer: D Explanation:

One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This “multitenant” nature means that workloads from different clients can be on the same system, and a flaw in implementation could compromise security.

Question No: 92 – (Topic 1)

Pete, the system administrator, wishes to monitor and limit users’ access to external websites.

Which of the following would BEST address this?

  1. Block all traffic on port 80.

  2. Implement NIDS.

  3. Use server load balancers.

  4. Install a proxy server.

Answer: D Explanation:

A proxy is a device that acts on behalf of other(s). In the interest of security, all internal user interaction with the Internet should be controlled through a proxy server. The proxy server should automatically block known malicious sites. The proxy server should cache often-accessed sites to improve performance.

Question No: 93 – (Topic 1)

Which of the following protocols allows for secure transfer of files? (Select TWO).

  1. ICMP

  2. SNMP

  3. SFTP

  4. SCP

  5. TFTP

Answer: C,D Explanation:

Standard FTP is a protocol often used to move files between one system and another either over the Internet or within private networks. SFTP is a secured alternative to standard FTP.

Secure Copy Protocol (SCP) is a secure file-transfer facility based on SSH and Remote Copy Protocol (RCP).

Question No: 94 – (Topic 1)

Which of the following devices is MOST likely being used when processing the following?



  1. Firewall

  2. NIPS

  3. Load balancer

  4. URL filter

Answer: A Explanation:

Firewalls, routers, and even switches can use ACLs as a method of security management. An access control list has a deny ip any any implicitly at the end of any access control list. ACLs deny by default and allow by exception.

Question No: 95 – (Topic 1)

Which of the following is a difference between TFTP and FTP?

  1. TFTP is slower than FTP.

  2. TFTP is more secure than FTP.

  3. TFTP utilizes TCP and FTP uses UDP.

  4. TFTP utilizes UDP and FTP uses TCP.

Answer: D Explanation:

FTP employs TCP ports 20 and 21 to establish and maintain client-to-server communications, whereas TFTP makes use of UDP port 69.

Question No: 96 – (Topic 1)

A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN?

  1. WPA2 CCMP

  2. WPA

  3. WPA with MAC filtering

  4. WPA2 TKIP

Answer: A


CCMP is the standard encryption protocol for use with the WPA2 standard and is much more secure than the WEP protocol and TKIP protocol of WPA. CCMP provides the following security services:

Data confidentiality; ensures only authorized parties can access the information Authentication; provides proof of genuineness of the user

Access control in conjunction with layer management

Because CCMP is a block cipher mode using a 128-bit key, it is secure against attacks to the 264 steps of operation.

Question No: 97 – (Topic 1)

When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com. Which of the following BEST describes this type of record?

  1. DNSSEC record

  2. IPv4 DNS record

  3. IPSEC DNS record

  4. IPv6 DNS record

Answer: D

Explanation: The AAAA Address record links a FQDN to an IPv6 address.

Question No: 98 – (Topic 1)

Pete, a security engineer, is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar.

Additionally, the MAC addresses of all five servers appear on the same switch port. Which of the following is MOST likely the cause?

  1. The system is running 802.1x.

  2. The system is using NAC.

  3. The system is in active-standby mode.

  4. The system is virtualized.

Answer: D Explanation:

Virtualization allows a single set of hardware to host multiple virtual machines.

Question No: 99 – (Topic 1)

The security administrator has been tasked to update all the access points to provide a more secure connection. All access points currently use WPA TKIP for encryption. Which of the following would be configured to provide more secure connections?

  1. WEP

  2. WPA2 CCMP

  3. Disable SSID broadcast and increase power levels

  4. MAC filtering

Answer: B Explanation:

CCMP makes use of 128-bit AES encryption with a 48-bit initialization vector. This initialization vector makes cracking a bit more difficult.

Question No: 100 – (Topic 1)

A network administrator is asked to send a large file containing PII to a business associate. Which of the following protocols is the BEST choice to use?

  1. SSH

  2. SFTP

  3. SMTP

  4. FTP

Answer: B Explanation:

SFTP encrypts authentication and data traffic between the client and server by making use of SSH to provide secure FTP communications. As a result, SFTP offers protection for both the authentication traffic and the data transfer taking place between a client and server.

100% Ensurepass Free Download!
Download Free Demo:JK0-022 Demo PDF
100% Ensurepass Free Guaranteed!
JK0-022 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com