[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 21-30

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 21 – (Topic 1)

Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?

  1. Phishing

  2. Tailgating

  3. Pharming

  4. Vishing

Answer: D

Question No: 22 – (Topic 1)

A user in the company is in charge of various financial roles but needs to prepare for an upcoming audit. They use the same account to access each financial system. Which of the following security controls will MOST likely be implemented within the company?

  1. Account lockout policy

  2. Account password enforcement

  3. Password complexity enabled

  4. Separation of duties

Answer: D

Question No: 23 – (Topic 1)

A CRL is comprised oF.

  1. Malicious IP addresses.

  2. Trusted CA’s.

  3. Untrusted private keys.

  4. Public keys.

Answer: D

Question No: 24 – (Topic 1)

Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

  1. Logic bomb

  2. Worm

  3. Trojan

  4. Adware

Answer: C

Question No: 25 – (Topic 1)

Which of the following may significantly reduce data loss if multiple drives fail at the same time?

  1. Virtualization

  2. RAID

  3. Load balancing

  4. Server clustering

Answer: B

Question No: 26 – (Topic 1)

Which of the following should be considered to mitigate data theft when using CAT5 wiring?

  1. CCTV

  2. Environmental monitoring

  3. Multimode fiber

  4. EMI shielding

Answer: D

Question No: 27 – (Topic 1)

To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?

  1. Management

  2. Administrative

  3. Technical

  4. Operational

Answer: C

Question No: 28 – (Topic 1)

Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?

  1. Connect the WAP to a different switch.

  2. Create a voice VLAN.

  3. Create a DMZ.

  4. Set the switch ports to 802.1q mode.

Answer: B

Question No: 29 – (Topic 1)

Which of the following IP addresses would be hosts on the same subnet given the subnet mask (Select TWO).






Answer: C,D

Question No: 30 – (Topic 1)

Which of the following algorithms has well documented collisions? (Select TWO).

  1. AES

  2. MD5

  3. SHA

  4. SHA-256

  5. RSA

Answer: B,C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.