[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 121-130

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 121 – (Topic 2)

Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this goal?

  1. A host-based intrusion prevention system

  2. A host-based firewall

  3. Antivirus update system

  4. A network-based intrusion detection system

Answer: B

Question No: 122 – (Topic 2)

Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?

  1. Firewall

  2. Switch

  3. URL content filter

  4. Spam filter

Answer: C

Question No: 123 – (Topic 2)

Pete, the system administrator, wishes to monitor and limit users’ access to external websites. Which of the following would BEST address this?

  1. Block all traffic on port 80.

  2. Implement NIDS.

  3. Use server load balancers.

  4. Install a proxy server.

Answer: D

Question No: 124 – (Topic 2)

Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?

  1. PAT

  2. NAP

  3. DNAT

  4. NAC

Answer: A

Question No: 125 – (Topic 2)

Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability?

  1. Twofish

  2. Diffie-Hellman

  3. ECC

  4. RSA

Answer: C

Question No: 126 – (Topic 2)

Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach?

A. $1,500 B. $3,750 C. $15,000 D. $75,000

Answer: B

Question No: 127 – (Topic 2)

Methods to test the responses of software and web applications to unusual or unexpected inputs is known as:

  1. Brute force.

  2. HTML encoding.

  3. Web crawling.

  4. Fuzzing.

Answer: D

Question No: 128 – (Topic 2)

Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?

  1. TCP 23

  2. UDP 69

  3. TCP 22

  4. TCP 21

Answer: C

Question No: 129 – (Topic 2)

Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent?

  1. Warm site

  2. Load balancing

  3. Clustering

  4. RAID

Answer: C

Question No: 130 – (Topic 2)

Which statement is TRUE about the operation of a packet sniffer?

  1. It can only have one interface on a management network.

  2. They are required for firewall operation and stateful inspection.

  3. The Ethernet card must be placed in promiscuous mode.

  4. It must be placed on a single virtual LAN interface.

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.