[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 151-160

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 151 – (Topic 2)

Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to?

  1. PAP, MSCHAPv2

  2. CHAP, PAP

  3. MSCHAPv2, NTLMv2

  4. NTLM, NTLMv2

Answer: A

Question No: 152 – (Topic 2)

Which of the following is an advantage of implementing individual file encryption on a hard drive which already deploys full disk encryption?

  1. Reduces processing overhead required to access the encrypted files

  2. Double encryption causes the individually encrypted files to partially lose their properties

  3. Individually encrypted files will remain encrypted when copied to external media

  4. File level access control only apply to individually encrypted files in a fully encrypted drive

Answer: C

Question No: 153 – (Topic 2)

An IT director is looking to reduce the footprint of their company’s server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. Which of the following BEST describes this arrangement?

  1. Infrastructure as a Service

  2. Storage as a Service

  3. Platform as a Service

  4. Software as a Service

Answer: A

Question No: 154 – (Topic 2)

A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at the site were facing the wrong direction to capture the incident. The analyst ensures the cameras are turned to face the proper direction. Which of the following types of controls is being used?

  1. Detective

  2. Deterrent

  3. Corrective

  4. Preventive

Answer: C

Question No: 155 – (Topic 2)

A security administrator wishes to change their wireless network so that IPSec is built into the protocol and NAT is no longer required for address range extension. Which of the following protocols should be used in this scenario?

  1. WPA2

  2. WPA

  3. IPv6

  4. IPv4

Answer: C

Question No: 156 – (Topic 2)

The network administrator is responsible for promoting code to applications on a DMZ web server. Which of the following processes is being followed to ensure application integrity?

  1. Application hardening

  2. Application firewall review

  3. Application change management

  4. Application patch management

Answer: C

Question No: 157 – (Topic 2)

An IT auditor tests an application as an authenticated user. This is an example of which of the following types of testing?

  1. Penetration

  2. White box

  3. Black box

  4. Gray box

Answer: D

Question No: 158 – (Topic 2)

The manager has a need to secure physical documents every night, since the company began enforcing the clean desk policy. The BEST solution would includE. (Select TWO).

  1. Fire- or water-proof safe.

  2. Department door locks.

  3. Proximity card.

  4. 24-hour security guard.

  5. Locking cabinets and drawers.

Answer: A,E

Question No: 159 – (Topic 2)

Which of the following is an important implementation consideration when deploying a wireless network that uses a shared password?

  1. Authentication server

  2. Server certificate

  3. Key length

  4. EAP method

Answer: C

Question No: 160 – (Topic 2)

Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords?

  1. EAP-MD5

  2. WEP


  4. EAP-TLS

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.