[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 101-110

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 101 – (Topic 2)

Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?

  1. Network based firewall

  2. Anti-spam software

  3. Host based firewall

  4. Anti-spyware software

Answer: D

Question No: 102 – (Topic 2)

Which of the following protocols allows for secure transfer of files? (Select TWO).

  1. ICMP

  2. SNMP

  3. SFTP

  4. SCP

  5. TFTP

Answer: C,D

Question No: 103 – (Topic 2)

Which of the following passwords is the LEAST complex?

  1. MyTrain!45

  2. Mytr@in!!

  3. MyTr@in12

  4. MyTr@in#8

Answer: B

Question No: 104 – (Topic 2)

During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).

  1. 21

  2. 22

  3. 23

  4. 69

E. 3389

  1. SSH

  2. Terminal services

  3. Rlogin

  4. Rsync

  5. Telnet

Answer: B,C,F,J

Question No: 105 – (Topic 2)

Which of the following is an application security coding problem?

  1. Error and exception handling

  2. Patch management

  3. Application hardening

  4. Application fuzzing

Answer: A

Question No: 106 – (Topic 2)

An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement?

  1. Implement IIS hardening by restricting service accounts.

  2. Implement database hardening by applying vendor guidelines.

  3. Implement perimeter firewall rules to restrict access.

  4. Implement OS hardening by applying GPOs.

Answer: D

Question No: 107 – (Topic 2)

Which of the following is the MOST specific plan for various problems that can arise within a system?

  1. Business Continuity Plan

  2. Continuity of Operation Plan

  3. Disaster Recovery Plan

  4. IT Contingency Plan

Answer: D

Question No: 108 – (Topic 2)

Which of the following BEST describes the weakness in WEP encryption?

  1. The initialization vector of WEP uses a crack-able RC4 encryption algorithm. Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived.

  2. The WEP key is stored in plain text and split in portions across 224 packets of random data. Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key.

  3. The WEP key has a weak MD4 hashing algorithm used. A simple rainbow table can be used to generate key possibilities due to MD4 collisions.

  4. The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.

Answer: D

Question No: 109 – (Topic 2)

Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. Which of the following should Sara do to address the risk?

  1. Accept the risk saving $10,000.

  2. Ignore the risk saving $5,000.

  3. Mitigate the risk saving $10,000.

  4. Transfer the risk saving $5,000.

Answer: D

Question No: 110 – (Topic 2)

Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?




  4. Kerberos

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.