CompTIA JK0-022 - CompTIA Academic/E2C Security+ Certification Exam Voucher Only Exam
Page: 2 / 199
Total 993 questions
Question #6 (Topic: Topic 1)
Pete, the system administrator, wants to restrict access to advertisements, games, and
gambling web sites. Which of the following devices would BEST achieve this goal?
gambling web sites. Which of the following devices would BEST achieve this goal?
A. Firewall
B. Switch
C. URL content filter
D. Spam filter
Answer: C
Question #7 (Topic: Topic 1)
A network consists of various remote sites that connect back to two main locations. Pete,
the security administrator, needs to block TELNET access into the network. Which of the
following, by default, would be the BEST choice to accomplish this goal?
the security administrator, needs to block TELNET access into the network. Which of the
following, by default, would be the BEST choice to accomplish this goal?
A. Block port 23 on the L2 switch at each remote site
B. Block port 23 on the network firewall
C. Block port 25 on the L2 switch at each remote site
D. Block port 25 on the network firewall
Answer: B
Question #8 (Topic: Topic 1)
Matt, the network engineer, has been tasked with separating network traffic between virtual
machines on a single hypervisor. Which of the following would he implement to BEST
address this requirement? (Select TWO).
machines on a single hypervisor. Which of the following would he implement to BEST
address this requirement? (Select TWO).
A. Virtual switch
B. NAT
C. System partitioning
D. Access-list
E. Disable spanning tree
F. VLAN
Answer: A,F
Question #9 (Topic: Topic 1)
NO: 104
A UNIX administrator would like to use native commands to provide a secure way of
connecting to other devices remotely and to securely transfer files. Which of the following
protocols could be utilized? (Select TWO).
A UNIX administrator would like to use native commands to provide a secure way of
connecting to other devices remotely and to securely transfer files. Which of the following
protocols could be utilized? (Select TWO).
A. RDP
B. SNMP
C. FTP
D. SCP
E. SSH
Answer: D,E
Question #10 (Topic: Topic 1)
Joe, a security administrator, believes that a network breach has occurred in the datacenter
as a result of a misconfigured router access list, allowing outside access to an SSH server.
Which of the following should Joe search for in the log files?
as a result of a misconfigured router access list, allowing outside access to an SSH server.
Which of the following should Joe search for in the log files?
A. Failed authentication attempts
B. Network ping sweeps
C. Host port scans
D. Connections to port 22
Answer: D