[Free] 2017(Nov) Dumps4cert Testinsides CompTIA JK0-022 Dumps with VCE and PDF Download 221-230

Dumps4cert 2017 Nov CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/JK0-022.html

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 221 – (Topic 2)

Which of the following describes the purpose of an MOU?

  1. Define interoperability requirements

  2. Define data backup process

  3. Define onboard/offboard procedure

  4. Define responsibilities of each party

Answer: D Explanation:

MOU or Memorandum of Understanding is a document outlining which party is responsible for what portion of the work.

Question No: 222 – (Topic 2)

A user in the company is in charge of various financial roles but needs to prepare for an upcoming audit. They use the same account to access each financial system. Which of the following security controls will MOST likely be implemented within the company?

  1. Account lockout policy

  2. Account password enforcement

  3. Password complexity enabled

  4. Separation of duties

Answer: D Explanation:

Separation of duties means that users are granted only the permissions they need to do their work and no more. More so it means that there is differentiation between users, employees and duties per se which form part of best practices.

Question No: 223 – (Topic 2)

Which of the following is a best practice when a mistake is made during a forensics examination?

  1. The examiner should verify the tools before, during, and after an examination.

  2. The examiner should attempt to hide the mistake during cross-examination.

  3. The examiner should document the mistake and workaround the problem.

  4. The examiner should disclose the mistake and assess another area of the disc.

Answer: C Explanation:

Every step in an incident response should be documented, including every action taken by end users and the incident-response team.

Question No: 224 – (Topic 2)

Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

  1. Hashing

  2. Stream ciphers

  3. Steganography

  4. Block ciphers

Answer: A Explanation:

Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash tables one of its characteristics is that it must be one-way – it is not reversible.

Question No: 225 – (Topic 2)

An employee recently lost a USB drive containing confidential customer data. Which of the following controls could be utilized to minimize the risk involved with the use of USB drives?

  1. DLP

  2. Asset tracking

  3. HSM

  4. Access control

Answer: A Explanation:

Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data.

Question No: 226 – (Topic 2)

Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed?

  1. Bollards

  2. Video surveillance

  3. Proximity readers

  4. Fencing

Answer: B Explanation:

Video surveillance is making use of a camera, or CCTV that is able to record everything it sees and is always running. This way you will be able to check exactly who enters secure

areas.

Question No: 227 – (Topic 2)

A security engineer is given new application extensions each month that need to be secured prior to implementation. They do not want the new extensions to invalidate or interfere with existing application security. Additionally, the engineer wants to ensure that the new requirements are approved by the appropriate personnel. Which of the following should be in place to meet these two goals? (Select TWO).

  1. Patch Audit Policy

  2. Change Control Policy

  3. Incident Management Policy

  4. Regression Testing Policy

  5. Escalation Policy

  6. Application Audit Policy

Answer: B,D Explanation:

A backout (regression testing) is a reversion from a change that had negative consequences. It could be, for example, that everything was working fi ne until you installed a service pack on a production machine, and then services that were normally available were no longer accessible. The backout, in this instance, would revert the system to the state that it was in before the service pack was applied. Backout plans can include uninstalling service packs, hotfi xes, and patches, but they can also include reversing a migration and using previous firmware. A key component to creating such a plan is identifying what events will trigger your implementing the backout.

A change control policy refers to the structured approach that is followed to secure a company’s assets in the event of changes occurring.

Question No: 228 – (Topic 2)

Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails resulting in system outages?

  1. Risk transference

  2. Change management

  3. Configuration management

  4. Access control revalidation

Answer: B Explanation:

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. In this case ‘scheduled system patching’.

Question No: 229 – (Topic 2)

Matt, a security administrator, wants to ensure that the message he is sending does not get intercepted or modified in transit. This concern relates to which of the following concepts?

  1. Availability

  2. Integrity

  3. Accounting

  4. Confidentiality

Answer: B Explanation:

Integrity means ensuring that data has not been altered. Hashing and message authentication codes are the most common methods to accomplish this. In addition, ensuring nonrepudiation via digital signatures supports integrity.

Question No: 230 – (Topic 2)

A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file was found on an underused server and appears to contain a zero-day exploit. Which of the following can the researcher do to determine if the file is malicious in nature?

  1. TCP/IP socket design review

  2. Executable code review

  3. OS Baseline comparison

  4. Software architecture review

Answer: C Explanation:

Zero-Day Exploits begin exploiting holes in any software the very day it is discovered. It is very difficult to respond to a zero-day exploit. Often, the only thing that you as a security administrator can do is to turn off the service. Although this can be a costly undertaking in terms of productivity, it is the only way to keep the network safe. In this case you want to check if the executable file is malicious. Since a baseline represents a secure state is would be possible to check the nature of the executable file in an isolated environment against the OS baseline.

100% Free Download!
Download Free Demo:JK0-022 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert JK0-022 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *