|CompTIA JK0-702 : CompTIA E2C A+ Practical Application (2009 Edition) Exam||904 Questions & Answers||Updated: Dec 29,18|
Immediate access to the CompTIA JK0-702 Exam and 1800+ other exam PDFs.
This is the BEST deal at only $149.00 for unlimited access. Pass FAST with actual answers to actual questions - We Guarantee You Pass!
Both of our Exams Packages come with all of our CompTIA Exams including all ActualTests JK0-702 tests. Find the same core area CompTIA questions with professionally verified answers, and PASS YOUR EXAM.
Option 1: JK0-702 exam and 1,800+ Other Exams
OR - Upgrade the Unlimited Access Package to include our Exam Engine. Know more than just the answers, understand the solutions! There is an Exam Engine for each of the 1,800 tests, including CompTIA JK0-702. Why Upgrade?
Option 2: JK0-702 exam, 1,800+ Other Exams PLUS Exam Engine
ActualTests JK0-702 Exam Engine Features
Customize your CompTIA E2C A+ Practical Application (2009 Edition) Exam certification experience.
CompTIA JK0-702 Exam Tips
With regard to computer security, what is an organization's primary purpose in conducting risk analysis?
A. To identify vulnerabilities to the computer systems within the organization.
B. To quantify the impact of potential threats in relation to the cost of lost business-functionality. (correct)
C. To identify how much it will cost to implement counter measures.
D. To delegate responsibility.
Hypothetically speaking, a company can spend millions on security and still not be 100% secure, while some companies can spend virtually nothing on security but because of the nature of their business, they won't be at risk of losing anything. Risk analysis is to find out exactly how much security is worth to you, and how much security you can get for how much its worth.
You work as the system administrator at TestKing.com. You have just performed a backup of the data on a server. Under which of the following conditions will the data on the server still be at risk?
A. If recovery procedures are not tested. (correct)
B. If all users do not log off while the backup is made.
C. If backup media is moved to an off-site location.
D. If an administrator notices a failure during the backup process.
Recovery is equally as important a step as the original backup. What good is an up to date backup file, if it can't be recovered properly? Sadly, most system administrators make the assumption that their recovery will work flawlessly and fail to test their recovery procedures.
You are in the process of transporting stored media to a remote location. Identify a possible security issue during this process?
A. A courier x-raying the contents can be considered as a security issue.
B. Theft of the media can be considered as a security issue. (correct)
C. Timely restore of lost data can be considered as a security issue.
D. Corruption of the media can be considered as a security issue.
You complete a vulnerability assessment for the TestKing.com network and apply the most recent software patches. What should you do next prior to placing the network back into operation?
A. Your next step should be to execute penetration testing.
B. Your next step should be to update the baseline.
C. Your next step should be to conduct a follow-up vulnerability analysis.
D. Your next step should be to test the essential functionality. (correct)
Which of the following is the MOST common goal of operating system logging?
A. Determining the amount of time employees spend using various applications.
B. Keeping a record of system usage. (correct)
C. Providing details of what systems have been compromised.
D. Providing details of which systems are interconnected.
The answer asks for the most common system goal. So the correct answer isn't about what system logging can do, or should do, but what ALL system logging accomplishes. The most basic form of system logging is a pen and paper sign on, where a user logs their name, the system they use, their purpose, and the time they begin and end. So if a future incidence happens, one could go into the logs, and narrow down who could have witnessed it or been present.
Which attack will take place if a workstation is not completely updated with the latest operating system patches?
A. This is known as spoofing.
B. This is known as a brute force attack.
C. This is known as software exploitation. (correct)
D. This is known as port scanning.
You need to send important documents to a manager in the finance departments. What should you do to ensure nobody else is able to intercept the message?
A. You need to make use of Digital signatures.
B. You need to make use of Encryption. (correct)
C. You need to make use of Social engineering.
D. You need to make use of Non-repudiation.
Which of the following should be included as part of a fire protection plan for a computer room?
A. Procedures for an emergency shutdown of equipment. (correct)
B. A sprinkler system that exceeds local code requirements.
C. The exclusive use of non-flammable materials within the room.
D. Fireproof doors that can be easily opened if an alarm is sounded. (correct)
If there's a fire, the smart thing to do would be to perform an emergency system shutdown. Equipment that gets shut down properly will be less likely to spread the fire, and equipment that's shut down properly is more likely to preserve its data.Incorrect answers:A sprinkler system wouldn't necessarily be good for electronic equipment, as water isn't recommended for electrical fires (C02, dry chemical, or halon is appropriate for electrical fires), and it will damage electrical equipment.Non flammable materials in the room are good, but smoke or heat from another room can still damage equipment.
The new TestKing.com trainee technician wants to know in which byte range t he block number 6 of the MS DOS memory map is . How will you reply?
A. 320 to 383KB (correct)
B. 576 to 639KB
C. 960 to 1024KB
D. 64 to 127KB
The first 1024 KB of the memory map is divided up into 16 blocks of 64KB which in turn is
further divided into four 'pages' of 16KB each, the memory will be allocated by the processor to those applications or devices requesting it.
B: The byte range of 576 to 639KB points to block number 10.
C: The byte range of 960 to 1024KB points to block number 16
D: The byte range of 64 to 127KB points to block number 2
All Major Credit CardsWe accept Visa, Mastercard, Electron and American Express. You can also pay us via PayPal.
SSL Secure Transactions