[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 11-20

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 11 – (Topic 1)

Which of the following can be used by a security administrator to successfully recover a user’s forgotten password on a password protected file?

  1. Cognitive password

  2. Password sniffing

  3. Brute force

  4. Social engineering

Answer: C

Question No: 12 – (Topic 1)

A security administrator wants to check user password complexity. Which of the following is the BEST tool to use?

  1. Password history

  2. Password logging

  3. Password cracker

  4. Password hashing

Answer: C

Question No: 13 – (Topic 1)

Certificates are used for: (Select TWO).

  1. Client authentication.

  2. WEP encryption.

  3. Access control lists.

  4. Code signing.

  5. Password hashing.

Answer: A,D

Question No: 14 – (Topic 1)

Which of the following is a hardware based encryption device?

  1. EFS

  2. TrueCrypt

  3. TPM

  4. SLE

Answer: C

Question No: 15 – (Topic 1)

Which of the following BEST describes a protective countermeasure for SQL injection?

  1. Eliminating cross-site scripting vulnerabilities

  2. Installing an IDS to monitor network traffic

  3. Validating user input in web applications

  4. Placing a firewall between the Internet and database servers

Answer: C

Question No: 16 – (Topic 1)

Which of the following MOST interferes with network-based detection techniques?

  1. Mime-encoding

  2. SSL

  3. FTP

  4. Anonymous email accounts

Answer: B

Question No: 17 – (Topic 1)

A certificate authority takes which of the following actions in PKI?

  1. Signs and verifies all infrastructure messages

  2. Issues and signs all private keys

  3. Publishes key escrow lists to CRLs

  4. Issues and signs all root certificates

Answer: D

Question No: 18 – (Topic 1)

Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?

  1. Malicious code on the local system

  2. Shoulder surfing

  3. Brute force certificate cracking

  4. Distributed dictionary attacks

Answer: A

Question No: 19 – (Topic 1)

Separation of duties is often implemented between developers and administrators in order to separate which of the following?

  1. More experienced employees from less experienced employees

  2. Changes to program code and the ability to deploy to production

  3. Upper level management users from standard development employees

  4. The network access layer from the application access layer

Answer: B

Question No: 20 – (Topic 1)

A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?

  1. The request needs to be sent to the incident management team.

  2. The request needs to be approved through the incident management process.

  3. The request needs to be approved through the change management process.

  4. The request needs to be sent to the change management team.

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.