Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 151 – (Topic 2)
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to?
-
PAP, MSCHAPv2
-
CHAP, PAP
-
MSCHAPv2, NTLMv2
-
NTLM, NTLMv2
Answer: A
Question No: 152 – (Topic 2)
Which of the following is an advantage of implementing individual file encryption on a hard drive which already deploys full disk encryption?
-
Reduces processing overhead required to access the encrypted files
-
Double encryption causes the individually encrypted files to partially lose their properties
-
Individually encrypted files will remain encrypted when copied to external media
-
File level access control only apply to individually encrypted files in a fully encrypted drive
Answer: C
Question No: 153 – (Topic 2)
An IT director is looking to reduce the footprint of their company’s server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. Which of the following BEST describes this arrangement?
-
Infrastructure as a Service
-
Storage as a Service
-
Platform as a Service
-
Software as a Service
Answer: A
Question No: 154 – (Topic 2)
A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at the site were facing the wrong direction to capture the incident. The analyst ensures the cameras are turned to face the proper direction. Which of the following types of controls is being used?
-
Detective
-
Deterrent
-
Corrective
-
Preventive
Answer: C
Question No: 155 – (Topic 2)
A security administrator wishes to change their wireless network so that IPSec is built into the protocol and NAT is no longer required for address range extension. Which of the following protocols should be used in this scenario?
-
WPA2
-
WPA
-
IPv6
-
IPv4
Answer: C
Question No: 156 – (Topic 2)
The network administrator is responsible for promoting code to applications on a DMZ web server. Which of the following processes is being followed to ensure application integrity?
-
Application hardening
-
Application firewall review
-
Application change management
-
Application patch management
Answer: C
Question No: 157 – (Topic 2)
An IT auditor tests an application as an authenticated user. This is an example of which of the following types of testing?
-
Penetration
-
White box
-
Black box
-
Gray box
Answer: D
Question No: 158 – (Topic 2)
The manager has a need to secure physical documents every night, since the company began enforcing the clean desk policy. The BEST solution would includE. (Select TWO).
-
Fire- or water-proof safe.
-
Department door locks.
-
Proximity card.
-
24-hour security guard.
-
Locking cabinets and drawers.
Answer: A,E
Question No: 159 – (Topic 2)
Which of the following is an important implementation consideration when deploying a wireless network that uses a shared password?
-
Authentication server
-
Server certificate
-
Key length
-
EAP method
Answer: C
Question No: 160 – (Topic 2)
Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords?
-
EAP-MD5
-
WEP
-
PEAP-MSCHAPv2
-
EAP-TLS
Answer: C
100% Dumps4cert Free Download!
–Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |