[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 141-150

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 141 – (Topic 2)

Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent?

  1. Buffer overflow

  2. Pop-up blockers

  3. Cross-site scripting

  4. Fuzzing

Answer: A

Question No: 142 – (Topic 2)

Which of the following is the LEAST volatile when performing incident response procedures?

  1. Registers

  2. RAID cache

  3. RAM

  4. Hard drive

Answer: D

Question No: 143 – (Topic 2)

Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall application but does not have all the details. Jane needs to review the software before it is released to production. Which of the following reviews should Jane conduct?

  1. Gray Box Testing

  2. Black Box Testing

  3. Business Impact Analysis

  4. White Box Testing

Answer: A

Question No: 144 – (Topic 2)

The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following?

  1. Rainbow tables attacks

  2. Brute force attacks

  3. Birthday attacks

  4. Cognitive passwords attacks

Answer: D

Question No: 145 – (Topic 2)

Pete#39;s corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent?

  1. Collusion

  2. Impersonation

  3. Pharming

  4. Transitive Access

Answer: B

Question No: 146 – (Topic 2)

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has

implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?

  1. Interference

  2. Man-in-the-middle

  3. ARP poisoning

  4. Rogue access point

Answer: D

Question No: 147 – (Topic 2)

Which of the following can be implemented with multiple bit strength?

  1. AES

  2. DES

  3. SHA-1

  4. MD5

  5. MD4

Answer: A

Question No: 148 – (Topic 2)

Pete, the system administrator, has blocked users from accessing social media web sites. In addition to protecting company information from being accidentally leaked, which additional security benefit does this provide?

  1. No competition with the company’s official social presence

  2. Protection against malware introduced by banner ads

  3. Increased user productivity based upon fewer distractions

  4. Elimination of risks caused by unauthorized P2P file sharing

Answer: B

Question No: 149 – (Topic 2)

Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Pete’s BEST option?

  1. Use hardware already at an offsite location and configure it to be quickly utilized.

  2. Move the servers and data to another part of the company’s main campus from the server room.

  3. Retain data back-ups on the main campus and establish redundant servers in a virtual environment.

  4. Move the data back-ups to the offsite location, but retain the hardware on the main campus for redundancy.

Answer: A

Question No: 150 – (Topic 2)

A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?

  1. Block cipher

  2. Stream cipher

  3. CRC

  4. Hashing algorithm

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.