Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
JK0-022 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Braindumps CompTIA JK0-022 Dumps with VCE and PDF 401-410

September 18, 2017

EnsurePass
2017 Sep CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/JK0-022.html

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 401 – (Topic 2)

Who should be contacted FIRST in the event of a security breach?

  1. Forensics analysis team

  2. Internal auditors

  3. Incident response team

  4. Software vendors

Answer: C Explanation:

A security breach is an incident and requires a response. The incident response team would be better equipped to deal with any incident insofar as all their procedures are concerned. Their procedures in addressing incidents are: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control.

Question No: 402 DRAG DROP – (Topic 2)

A forensic analyst is asked to respond to an ongoing network attack on a server. Place the

items in the list below in the correct order in which the forensic analyst should preserve them.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

When dealing with multiple issues, address them in order of volatility (OOV); always deal with the most volatile first. Volatility can be thought of as the amount of time that you have to collect certain data before a window of opportunity is gone. Naturally, in an investigation you want to collect everything, but some data will exist longer than others, and you cannot possibly collect all of it once. As an example, the OOV in an investigation may be RAM, hard drive data, CDs/DVDs, and printouts.

Order of volatility: Capture system images as a snapshot of what exists, look at network traffic and logs, capture any relevant video/screenshots/hashes, record time offset on the systems, talk to witnesses, and track total man-hours and expenses associated with the investigation.

References:

Dulaney, Emmett and Chuck Eastton, CompTIA Security Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, p 453

Question No: 403 – (Topic 2)

When implementing fire suppression controls in a datacenter it is important to:

  1. Select a fire suppression system which protects equipment but may harm technicians.

  2. Ensure proper placement of sprinkler lines to avoid accidental leakage onto servers.

  3. Integrate maintenance procedures to include regularly discharging the system.

  4. Use a system with audible alarms to ensure technicians have 20 minutes to evacuate.

Answer: B Explanation:

Water-based systems can cause serious damage to all electrical equipment and the sprinkler lines in a fire suppression control system should be placed in such a way so as not to leak onto computers when it do get activated because it works with overhead nozzles.

Question No: 404 – (Topic 2)

During which of the following phases of the Incident Response process should a security administrator define and implement general defense against malware?

  1. Lessons Learned

  2. Preparation

  3. Eradication

  4. Identification

Answer: B Explanation:

Incident response procedures involves: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach;

Damage and loss control. It is important to stop malware before it ever gets hold of a system -thus you should know which malware is out there and take defensive measures – this means preparation to guard against malware infection should be done.

Question No: 405 – (Topic 2)

Which of the following concepts defines the requirement for data availability?

  1. Authentication to RADIUS

  2. Non-repudiation of email messages

  3. Disaster recovery planning

  4. Encryption of email messages

Answer: C Explanation:

A disaster-recovery plan, or scheme, helps an organization respond effectively when a disaster occurs. Disasters may include system failure, network failure, infrastructure failure, and natural disaster. The primary emphasis of such a plan is reestablishing services and minimizing losses.

Question No: 406 – (Topic 2)

The use of social networking sites introduces the risk of:

  1. Disclosure of proprietary information

  2. Data classification issues

  3. Data availability issues

  4. Broken chain of custody

Answer: A Explanation:

People and processes must be in place to prevent the unauthorized disclosure or proprietary information and sensitive information s these pose a security risk to companies. With social networking your company can be exposed to as many threats as the amount of users that make use of social networking and are not advised on security policy regarding the use of social networking.

Question No: 407 DRAG DROP – (Topic 2)

Drag the items on the left to show the different types of security for the shown devices. Not all fields need to be filled. Not all items need to be used.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Mobile Device Security GPS tracking

Remote wipe Device Encryption Strong password

Server in Data Center Security FM-200

Biometrics Proximity Badges Mantrap

For mobile devices, at bare minimum you should have the following security measures in place: Screen lock, Strong password, Device encryption, Remote wipe/Sanitation, voice encryption, GPS tracking, Application control, Storage segmentation, Asset tracking as well as Device Access control.

For servers in a data center your security should include: Fire extinguishers such as FM200 as part of fire suppression; Biometric, proximity badges, mantraps, HVAC, cable locks; these can all be physical security measures to control access to the server.

References:

Dulaney, Emmett and Chuck Eastton, CompTIA Security Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, p 418

Question No: 408 – (Topic 2)

Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?

  1. Incident management

  2. Server clustering

  3. Change management

  4. Forensic analysis

Answer: C Explanation:

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. In this case ‘performing updates to business critical systems.

Question No: 409 – (Topic 2)

Used in conjunction, which of the following are PII? (Select TWO).

  1. Marital status

  2. Favorite movie

  3. Pet’s name

  4. Birthday

  5. Full name

Answer: D,E Explanation:

Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card number, or patient record. A birthday together with

a full name makes it personally identifiable information.

Question No: 410 – (Topic 2)

A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to each password before the password is hashed. This technique is known as:

  1. Symmetric cryptography.

  2. Private key cryptography.

  3. Salting.

  4. Rainbow tables.

Answer: C Explanation:

Salting can be used to strengthen the hashing when the passwords were encrypted. Though hashing is a one-way algorithm it does not mean that it cannot be hacked. One method to hack a hash is though rainbow tables and salt is the counter measure to rainbow tables. With salt a password that you typed in and that has been encrypted with a hash will yield a letter combination other than what you actually types in when it is rainbow table attacked.

100% Free Download!
Download Free Demo:JK0-022 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass JK0-022 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE