CompTIA JK0-022 Security Cryptography Certification Exam Set 5

A recent review of accounts on various systems has found that after employees' passwords are required to change they are recycling the same password as before. Which of the following policies should be enforced to prevent this from happening? (Select TWO).


Options are :

  • Password complexity
  • Minimum password age (Correct)
  • Reverse encryption
  • Account lockouts
  • Password expiration
  • Password history (Correct)

Answer : Minimum password age Password history

Which of the following is a control that allows a mobile application to access and manipulate information which should only be available by another application on the same mobile device (e.g. a music application posting the name of the current song playing on the device on a social media site)?


Options are :

  • Mutually exclusive access
  • Transitive trust (Correct)
  • Co-hosted application
  • Dual authentication

Answer : Transitive trust

Which of the following controls should critical application servers implement to protect themselves from other potentially compromised application services?


Options are :

  • Content filter
  • NIDS
  • NIPS
  • Host-based firewalls (Correct)

Answer : Host-based firewalls

RC4 is a strong encryption protocol that is generally used with which of the following?


Options are :

  • EAP-TLS
  • PEAP
  • WPA2 CCMP
  • WEP (Correct)

Answer : WEP

A large multinational corporation with networks in 30 countries wants to establish an understanding of their overall public-facing network attack surface. Which of the following security techniques would be BEST suited for this?


Options are :

  • External penetration test
  • External vulnerability scan (Correct)
  • Internal penetration test
  • Internal vulnerability scan

Answer : External vulnerability scan

Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on employees' computers?


Options are :

  • Host-based firewalls
  • Least privilege accounts
  • Application white listing (Correct)
  • Intrusion Detection Systems

Answer : Application white listing

Establishing a method to erase or clear cluster tips is an example of securing which of the following?


Options are :

  • Data in use
  • Data in transit
  • Data in motion
  • Data at rest (Correct)

Answer : Data at rest

Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety of servers before deployment to the production environment while utilizing a limited amount of hardware resources. Which of the following would provide the BEST environment for performing this testing?


Options are :

  • Virtualization (Correct)
  • OS hardening
  • Sandboxing
  • Application control

Answer : Virtualization

Company XYZ has encountered an increased amount of buffer overflow attacks. The programmer has been tasked to identify the issue and report any findings. Which of the following is the FIRST step of action recommended in this scenario?


Options are :

  • Code Review (Correct)
  • Capability Maturity Model
  • Baseline Reporting
  • Quality Assurance and Testing

Answer : Code Review

An administrator is investigating a system that may potentially be compromised, and sees the following log entries on the router. Which of the following BEST describes the compromised system?


Options are :

  • It is an ARP poisoning attack
  • It is running a rogue web server
  • It is participating in a botnet (Correct)
  • It is being used in a man-in-the-middle attack

Answer : It is participating in a botnet

After a company has standardized to a single operating system, not all servers are immune to a well-known OS vulnerability. Which of the following solutions would mitigate this issue?


Options are :

  • Patch management system (Correct)
  • Initial baseline configurations
  • Discretionary access control
  • Host based firewall

Answer : Patch management system

A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them to customer PCs. Which of the following should the administrator use to test the patching process quickly and often?


Options are :

  • Create a full disk image to restore after each installation
  • Create an image of a patched PC and replicate it to servers
  • Create a virtualized sandbox and utilize snapshots (Correct)
  • Create an incremental backup of an unpatched PC

Answer : Create a virtualized sandbox and utilize snapshots

An administrator implements SELinux on a production web server. After implementing this, the web server no longer serves up files from users' home directories. To rectify this, the administrator creates a new policy as the root user. This is an example of which of the following? (Select TWO).


Options are :

  • Enforcing SELinux in the OS kernel is mandatory access control (Correct)
  • The policy added by the root user is mandatory access control
  • Enforcing SELinux in the OS kernel is rule-based access control
  • Enforcing SELinux in the OS kernel is role-based access control
  • The policy added by the root user is role-based access control
  • The policy added by the root user is rule-based access control (Correct)

Answer : Enforcing SELinux in the OS kernel is mandatory access control The policy added by the root user is rule-based access control

Which of the following types of technologies is used by security and research personnel for identification and analysis of new security threats in a networked environment by using false data/hosts for information collection?


Options are :

  • Protocol analyzer
  • Vulnerability scanner
  • Honeynet (Correct)
  • Port scanner

Answer : Honeynet

Which of the following is a directional antenna that can be used in point-to-point or pointto-multi-point WiFi communication systems? (Select TWO).


Options are :

  • Omni
  • Backfire (Correct)
  • Dish (Correct)
  • Dipole
  • PTZ

Answer : Backfire Dish

Which of the following are examples of detective controls?


Options are :

  • Biometrics, motion sensors and mantraps.
  • Motion sensors, intruder alarm and audit. (Correct)
  • Intruder alarm, mantraps and firewall.
  • Audit, firewall, anti-virus and biometrics.

Answer : Motion sensors, intruder alarm and audit.

The system administrator is reviewing the following logs from the company web server: Which of the following is this an example of?


Options are :

  • Offline dictionary attack
  • Online hybrid attack (Correct)
  • Offline brute force attack
  • Online rainbow table attack

Answer : Online hybrid attack

A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of the following can the technician use to verify if a system file was compromised? (Select TWO).


Options are :

  • ECDHE
  • PGP
  • MD5 (Correct)
  • AES
  • SHA (Correct)

Answer : MD5 SHA

Which of the following would MOST likely involve GPS?


Options are :

  • WPS attack
  • Protocol analyzer
  • Replay attack
  • Wardriving (Correct)

Answer : Wardriving

Which of the following documents outlines the technical and security requirements of an agreement between organizations?


Options are :

  • ISA (Correct)
  • RFQ
  • RFC
  • BPA

Answer : ISA

A security administrator at a company which implements key escrow and symmetric encryption only, needs to decrypt an employee's file. The employee refuses to provide the decryption key to the file. Which of the following can the administrator do to decrypt the file?


Options are :

  • Retrieve the encryption key (Correct)
  • Use the CA private key
  • Use the employee's private key
  • Use the recovery agent

Answer : Retrieve the encryption key

A set of standardized system images with a pre-defined set of applications is used to build end-user workstations. The security administrator has scanned every workstation to create a current inventory of all applications that are installed on active workstations and is documenting which applications are out-of-date and could be exploited. The security administrator is determining the:


Options are :

  • application baseline.
  • attack surface. (Correct)
  • S hardening effectiveness.
  • application hardening effectiveness

Answer : attack surface.

A CRL is comprised of.


Options are :

  • Untrusted private keys.
  • Trusted CAís.
  • Malicious IP addresses.
  • Public keys (Correct)

Answer : Public keys

In order to use a two-way trust model the security administrator MUST implement which of the following?


Options are :

  • PKI (Correct)
  • DAC
  • TPM
  • HTTPS

Answer : PKI

Which of the following protocols is used to validate whether trust is in place and accurate by returning responses of either "good", "unknown", or "revoked"?


Options are :

  • PKI
  • CRL
  • RA
  • OCSP (Correct)

Answer : OCSP

The finance department works with a bank which has recently had a number of cyber attacks. The finance department is concerned that the banking website certificates have been compromised. Which of the following can the finance department check to see if any of the bankís certificates are still valid?


Options are :

  • Bankís private key
  • Bankís key escrow
  • Bankís CRL (Correct)
  • Bankís recovery agent

Answer : Bankís CRL

A software development company wants to implement a digital rights management solution to protect its intellectual property. Which of the following should the company implement to enforce software digital rights?


Options are :

  • IPsec
  • Transport encryption
  • Public key infrastructure (Correct)
  • Non-repudiation

Answer : Public key infrastructure

A system administrator is notified by a staff member that their laptop has been lost. The laptop contains the userís digital certificate. Which of the following will help resolve the issue? (Select TWO).


Options are :

  • Restore the certificate using a CRL
  • Restore the certificate using a recovery agent
  • Revoke the digital certificate (Correct)
  • Mark the key as private and import it
  • Issue a new digital certificate (Correct)

Answer : Revoke the digital certificate Issue a new digital certificate

Which of the following is true about the recovery agent?


Options are :

  • It can recover both the private and public key of federated users.
  • It can decrypt messages of users who lost their private key. (Correct)
  • It can recover and provide users with their lost public key.
  • It can recover and provide users with their lost or private key.

Answer : It can decrypt messages of users who lost their private key.

After encrypting all laptop hard drives, an executive officerís laptop has trouble booting to the operating system. Now that it is successfully encrypted the helpdesk cannot retrieve the data. Which of the following can be used to decrypt the information for retrieval?


Options are :

  • Trust models
  • Private key
  • Public key
  • Recovery agent (Correct)

Answer : Recovery agent

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions