Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
JK0-022 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Braindumps CompTIA JK0-022 Dumps with VCE and PDF 641-650

September 18, 2017

EnsurePass
2017 Sep CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/JK0-022.html

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 641 – (Topic 4)

Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?

  1. Check the referrer field in the HTTP header

  2. Disable Flash content

  3. Use only cookies for authentication

  4. Use only HTTPS URLs

Answer: A Explanation:

XSRF or cross-site request forgery applies to web applications and is an attack that exploits the web application’s trust of a user who known or is supposed to have been authenticated. This is accomplished by changing values in the HTTP header and even in the user’s cookie to falsify access. It can be prevented by embedding additional authentication data into requests that allows the web application to detect requests from unauthorized locations. Examples are synchronizer token patterns, cookie-to-header tokens, and checking the HTTP Referrer header and the HTTP Origin header.

Question No: 642 – (Topic 4)

Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate laptops where the file structures are unknown?

  1. Folder encryption

  2. File encryption

  3. Whole disk encryption

  4. Steganography

Answer: C

Explanation:

Full-disk encryption encrypts the data on the hard drive of the device or on a removable drive. This feature ensures that the data on the device or removable drive cannot be accessed in a useable form should it be stolen. Furthermore, full-disk encryption is not dependant on knowledge of the file structure.

Question No: 643 – (Topic 4)

After Matt, a user enters his username and password at the login screen of a web enabled portal, the following appears on his screen:

`Please only use letters and numbers on these fields’ Which of the following is this an example of?

  1. Proper error handling

  2. Proper input validation

  3. Improper input validation

  4. Improper error handling

Answer: B Explanation:

Input validation is an aspect of secure coding and is intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain.

Question No: 644 – (Topic 4)

A security administrator has implemented a policy to prevent data loss. Which of the following is the BEST method of enforcement?

  1. Internet networks can be accessed via personally-owned computers.

  2. Data can only be stored on local workstations.

  3. Wi-Fi networks should use WEP encryption by default.

  4. Only USB devices supporting encryption are to be used.

Answer: D Explanation:

The concern for preventing data loss is the concern for maintaining data confidentiality. This can be accomplished through encryption, access controls, and steganography.

USB encryption is usually provided by the vendor of the USB device. It is not included on all USB devices.

Question No: 645 – (Topic 4)

Which of the following BEST explains the use of an HSM within the company servers?

  1. Thumb drives present a significant threat which is mitigated by HSM.

  2. Software encryption can perform multiple functions required by HSM.

  3. Data loss by removable media can be prevented with DLP.

  4. Hardware encryption is faster than software encryption.

Answer: D Explanation:

Hardware Security Module (HSM) is a cryptoprocessor that can be used to enhance security. It provides a fast solution for the for large asymmetrical encryption calculations and is much faster than software-based cryptographic solutions.

Question No: 646 – (Topic 4)

The systems administrator wishes to implement a hardware-based encryption method that could also be used to sign code. They can achieve this by:

  1. Utilizing the already present TPM.

  2. Configuring secure application sandboxes.

  3. Enforcing whole disk encryption.

  4. Moving data and applications into the cloud.

Answer: A Explanation:

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates.

Question No: 647 – (Topic 4)

Which of the following hardware based encryption devices is used as a part of multi-factor authentication to access a secured computing system?

  1. Database encryption

  2. USB encryption

  3. Whole disk encryption

  4. TPM

Answer: D Explanation:

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates.

Question No: 648 – (Topic 4)

Which of the following file systems is from Microsoft and was included with their earliest operating systems?

  1. NTFS

  2. UFS

  3. MTFS

  4. FAT

Answer: D Explanation:

File Allocation Table (FAT) is a file system created by Microsoft and used for its earliest DOS operating systems.

Question No: 649 – (Topic 4)

An IT security technician is actively involved in identifying coding issues for her company.

Which of the following is an application security technique that can be used to identify unknown weaknesses within the code?

  1. Vulnerability scanning

  2. Denial of service

  3. Fuzzing

  4. Port scanning

Answer: C Explanation:

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks.

Question No: 650 – (Topic 4)

Which of the following data security techniques will allow Matt, an IT security technician, to encrypt a system with speed as its primary consideration?

  1. Hard drive encryption

  2. Infrastructure as a service

  3. Software based encryption

  4. Data loss prevention

Answer: A Explanation:

Disk and device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. It should be implemented using a hardware-based solution for greater speed.

100% Free Download!
Download Free Demo:JK0-022 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass JK0-022 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE