[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 221-230

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 221 – (Topic 3)

An information bank has been established to store contacts, phone numbers and other records. A UNIX application needs to connect to the index server using port 389. Which of the following authentication services should be used on this port by default?


  2. Kerberos


  4. LDAP

Answer: D

Question No: 222 – (Topic 3)

An internal auditor is concerned with privilege creep that is associated with transfers inside the company. Which mitigation measure would detect and correct this?

  1. User rights reviews

  2. Least privilege and job rotation

  3. Change management

  4. Change Control

Answer: A

Question No: 223 – (Topic 3)

Which of the following is the default port for TFTP?

  1. 20

  2. 69

  3. 21

  4. 68

Answer: B

Question No: 224 – (Topic 3)

Which of the following concepts are included on the three sides of the “security triangle”? (Select THREE).

  1. Confidentiality

  2. Availability

  3. Integrity

  4. Authorization

  5. Authentication

  6. Continuity

Answer: A,B,C

Question No: 225 – (Topic 3)

Which of the following concepts allows an organization to group large numbers of servers together in order to deliver a common service?

  1. Clustering

  2. RAID

  3. Backup Redundancy

  4. Cold site

Answer: A

Question No: 226 – (Topic 3)

Which of the following security concepts identifies input variables which are then used to perform boundary testing?

  1. Application baseline

  2. Application hardening

  3. Secure coding

  4. Fuzzing

Answer: D

Question No: 227 – (Topic 3)

Users need to exchange a shared secret to begin communicating securely. Which of the following is another name for this symmetric key?

  1. Session Key

  2. Public Key

  3. Private Key

  4. Digital Signature

Answer: A

Question No: 228 – (Topic 3)

Which of the following cryptographic related browser settings allows an organization to communicate securely?

  1. SSL 3.0/TLS 1.0

  2. 3DES

  3. Trusted Sites

  4. HMAC

Answer: A

Question No: 229 – (Topic 3)

Which of the following is the BEST reason to provide user awareness and training

programs for organizational staff?

  1. To ensure proper use of social media

  2. To reduce organizational IT risk

  3. To detail business impact analyses

  4. To train staff on zero-days

Answer: B

Question No: 230 – (Topic 3)

A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?

  1. BlockeD. TFTP, HTTP, NetBIOS; AlloweD. HTTPS, FTP

  2. BlockeD. FTP, TFTP, HTTP, NetBIOS; AlloweD. SFTP, SSH, SCP, HTTPS

  3. BlockeD. SFTP, TFTP, HTTP, NetBIOS; AlloweD. SSH, SCP, HTTPS

  4. BlockeD. FTP, HTTP, HTTPS; AlloweD. SFTP, SSH, SCP, NetBIOS

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.