[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 111-120

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 111 – (Topic 2)

Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?

  1. Input validation

  2. Network intrusion detection system

  3. Anomaly-based HIDS

  4. Peer review

Answer: A

Question No: 112 – (Topic 2)

Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?

  1. Sign in and sign out logs

  2. Mantrap

  3. Video surveillance

  4. HVAC

Answer: B

Question No: 113 – (Topic 2)

Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss to assist in an FM-200 deployment?

  1. Water base sprinkler system

  2. Electrical

  3. HVAC

  4. Video surveillance

Answer: C

Question No: 114 – (Topic 2)

Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure?

  1. Hardware load balancing

  2. RAID

  3. A cold site

  4. A host standby

Answer: B

Question No: 115 – (Topic 2)

Which of the following fire suppression systems is MOST likely used in a datacenter?

  1. FM-200

  2. Dry-pipe

  3. Wet-pipe

  4. Vacuum

Answer: A

Question No: 116 – (Topic 2)

A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?

  1. LDAP


  3. Kerberos


Answer: C

Question No: 117 – (Topic 2)

While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks?

  1. Cross-site scripting

  2. Buffer overflow

  3. Header manipulation

  4. Directory traversal

Answer: B

Question No: 118 – (Topic 2)

Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?

  1. Vulnerability assessment

  2. Black box testing

  3. White box testing

  4. Penetration testing

Answer: A

Question No: 119 – (Topic 2)

A security technician is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the

access control type found in a firewall. With which of the following should the security technician respond?

  1. Rule based access control

  2. Role based access control

  3. Discretionary access control

  4. Mandatory access control

Answer: A

Question No: 120 – (Topic 2)

Jane, a security administrator, has been tasked with explaining authentication services to the company’s management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company’s environment?

  1. Kerberos

  2. Least privilege


  4. LDAP

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.