[Free] 2018(Aug) Dumps4cert CompTIA JK0-022 Dumps with VCE and PDF Download 251-260

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-022
100% Free Download! 100% Pass Guaranteed!

CompTIA Academic/E2C Security Certification Exam Voucher Only

Question No: 251 – (Topic 2)

The main corporate website has a service level agreement that requires availability 100% of the time, even in the case of a disaster. Which of the following would be required to meet this demand?

  1. Warm site implementation for the datacenter

  2. Geographically disparate site redundant datacenter

  3. Localized clustering of the datacenter

  4. Cold site implementation for the datacenter

Answer: B Explanation:

Data backups, redundant systems, and disaster recovery plans all support availability. AN in this case a geographically disparate site redundant datacenter represents 100% availability regardless of whether a disaster event occurs.

Question No: 252 – (Topic 2)

Which of the following may significantly reduce data loss if multiple drives fail at the same time?

  1. Virtualization

  2. RAID

  3. Load balancing

  4. Server clustering

Answer: B Explanation:

RAID, or redundant array of independent disks (RAID). RAID allows your existing servers to have more than one hard drive so that if the main hard drive fails, the system keeps functioning.

Question No: 253 – (Topic 2)

A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has experienced several laptop thefts from the cafe during peak shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate laptop theft. Which of the following would provide the IT department with the BEST solution?

  1. Attach cable locks to each laptop

  2. Require each customer to sign an AUP

  3. Install a GPS tracking device onto each laptop

  4. Install security cameras within the perimeter of the caf茅

Answer: A Explanation:

All laptop cases include a built-in security slot in which a cable lock can be inserted to prevent it from easily being removed from the premises.

Question No: 254 – (Topic 2)

Which of the following policies is implemented in order to minimize data loss or theft?

  1. PII handling

  2. Password policy

  3. Chain of custody

  4. Zero day exploits

Answer: A Explanation:

Although the concept of PII is old, it has become much more important as information technology and the Internet have made it easier to collect PII through breaches of internet security, network security and web browser security, leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts.

Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card number, or patient record.

Thus a PII handling policy can be used to protect data.

Question No: 255 – (Topic 2)

After a production outage, which of the following documents contains detailed information on the order in which the system should be restored to service?

  1. Succession planning

  2. Disaster recovery plan

  3. Information security plan

  4. Business impact analysis

Answer: B Explanation:

A disaster-recovery plan, or scheme, helps an organization respond effectively when a disaster occurs. Disasters may include system failure, network failure, infrastructure failure, and natural disaster. The primary emphasis of such a plan is reestablishing services and minimizing losses.

Question No: 256 – (Topic 2)

The security administrator is implementing a malware storage system to archive all malware seen by the company into a central database. The malware must be categorized and stored based on similarities in the code. Which of the following should the security administrator use to identify similar malware?

  1. TwoFish

  2. SHA-512

  3. Fuzzy hashes

  4. HMAC

Answer: C Explanation:

Hashing is used to ensure that a message has not been altered. It can be useful for positively identifying malware when a suspected file has the same hash value as a known piece of malware. However, modifying a single bit of a malicious file will alter its hash value. To counter this, a continuous stream of hash values is generated for rolling block of code. This can be used to determine the similarity between a suspected file and known pieces of malware.

Question No: 257 – (Topic 2)

The security manager received a report that an employee was involved in illegal activity and has saved data to a workstation’s hard drive. During the investigation, local law enforcement’s criminal division confiscates the hard drive as evidence. Which of the following forensic procedures is involved?

  1. Chain of custody

  2. System image

  3. Take hashes

  4. Order of volatility

Answer: A Explanation:

Chain of custody deals with how evidence is secured, where it is stored, and who has access to it. When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been.

Question No: 258 – (Topic 2)

A company’s chief information officer (CIO) has analyzed the financial loss associated with the company’s database breach. They calculated that one single breach could cost the company $1,000,000 at a minimum. Which of the following documents is the CIO MOST likely updating?

  1. Succession plan

  2. Continuity of operation plan

  3. Disaster recovery plan

  4. Business impact analysis

Answer: D Explanation:

Business impact analysis (BIA) is the process of evaluating all of the critical systems in an organization to define impact and recovery plans. BIA isn’t concerned with external threats or vulnerabilities; the analysis focuses on the impact a loss would have on the organization. A BIA comprises the following: identifying critical functions, prioritizing critical business functions, calculating a timeframe for critical systems loss, and estimating the tangible impact on the organization.

Question No: 259 – (Topic 2)

Which of the following concepts is a term that directly relates to customer privacy considerations?

  1. Data handling policies

  2. Personally identifiable information

  3. Information classification

  4. Clean desk policies

Answer: B Explanation:

Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card number, or patient record. This has a direct relation to customer privacy considerations.

Question No: 260 – (Topic 2)

Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group. Which of the following would prevent her from denying accountability?

  1. Email Encryption

  2. Steganography

  3. Non Repudiation

  4. Access Control

Answer: C Explanation:

Nonrepudiation prevents one party from denying actions they carried out.

100% Dumps4cert Free Download!
JK0-022 PDF
100% Dumps4cert Pass Guaranteed!
JK0-022 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No