[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 131-140

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 131 – (Topic 2)

Which of the following firewall rules only denies DNS zone transfers?

  1. deny udp any any port 53

  2. deny ip any any

  3. deny tcp any any port 53

  4. deny all dns packets

Answer: C

Question No: 132 – (Topic 2)

Which of the following BEST explains the use of an HSM within the company servers?

  1. Thumb drives present a significant threat which is mitigated by HSM.

  2. Software encryption can perform multiple functions required by HSM.

  3. Data loss by removable media can be prevented with DLP.

  4. Hardware encryption is faster than software encryption.

Answer: D

Question No: 133 – (Topic 2)

Which of the following technologies can store multi-tenant data with different security requirements?

  1. Data loss prevention

  2. Trusted platform module

  3. Hard drive encryption

  4. Cloud computing

Answer: D

Question No: 134 – (Topic 2)

Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company data. Where and how should Matt meet this requirement?

  1. Matt should implement access control lists and turn on EFS.

  2. Matt should implement DLP and encrypt the company database.

  3. Matt should install Truecrypt and encrypt the company server.

  4. Matt should install TPMs and encrypt the company database.

Answer: B

Question No: 135 – (Topic 2)

Which of the following types of encryption will help in protecting files on a PED?

  1. Mobile device encryption

  2. Transport layer encryption

  3. Encrypted hidden container

  4. Database encryption

Answer: A

Question No: 136 – (Topic 2)

Which of the following does full disk encryption prevent?

  1. Client side attacks

  2. Clear text access

  3. Database theft

  4. Network-based attacks

Answer: B

Question No: 137 – (Topic 2)

Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company’s password policy. Which of the following should Pete do NEXT?

  1. Contact the Chief Information Officer and ask them to change the company password policy so that the application is made compliant.

  2. Tell the application development manager to code the application to adhere to the company’s password policy.

  3. Ask the application development manager to submit a risk acceptance memo so that the issue can be documented.

  4. Inform the Chief Information Officer of non-adherence to the security policy so that the developers can be reprimanded.

Answer: B

Question No: 138 – (Topic 2)

Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning?

  1. A recent security breach in which passwords were cracked.

  2. Implementation of configuration management processes.

  3. Enforcement of password complexity requirements.

  4. Implementation of account lockout procedures.

Answer: A

Question No: 139 – (Topic 2)

Which of the following presents the STRONGEST access control?

  1. MAC


  3. DAC

  4. RBAC

Answer: A

Question No: 140 – (Topic 2)

Which of the following encompasses application patch management?

  1. Configuration management

  2. Policy management

  3. Cross-site request forgery

  4. Fuzzing

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.