[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 241-250

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 241 – (Topic 3)

During a routine audit a web server is flagged for allowing the use of weak ciphers. Which of the following should be disabled to mitigate this risk? (Select TWO).

  1. SSL 1.0

  2. RC4

  3. SSL 3.0

  4. AES

  5. DES

  6. TLS 1.0

Answer: A,E

Question No: 242 – (Topic 3)

Review the following diagram depicting communication between PC1 and PC2 on each side of a router. Analyze the network traffic logs which show communication between the two computers as captured by the computer with IP


[]—-[INSIDE router OUTSIDE]—–[] LOGS

10:30:22, SRC, DST, SYN

10:30:23, SRC, DST, SYN/ACK

10:30:24, SRC, DST, ACK

Given the above information, which of the following can be inferred about the above environment?

  1. is a web server.

  2. The web server listens on a non-standard port.

  3. The router filters port 80 traffic.

  4. The router implements NAT.

Answer: D

Question No: 243 – (Topic 3)

The Chief Information Officer (CIO) wants to implement a redundant server location to which the production server images can be moved within 48 hours and services can be quickly restored, in case of a catastrophic failure of the primary datacenter’s HVAC. Which of the following can be implemented?

  1. Cold site

  2. Load balancing

  3. Warm site

  4. Hot site

Answer: C

Question No: 244 – (Topic 3)

The security administrator is observing unusual network behavior from a workstation. The workstation is communicating with a known malicious destination over an encrypted tunnel.

A full antivirus scan, with an updated antivirus definition file, does not show any signs of infection. Which of the following has happened on the workstation?

  1. Zero-day attack

  2. Known malware infection

  3. Session hijacking

  4. Cookie stealing

Answer: A

Question No: 245 – (Topic 3)

Which of the following controls can be used to prevent the disclosure of sensitive information stored on a mobile device’s removable media in the event that the device is lost or stolen?

  1. Hashing

  2. Screen locks

  3. Device password

  4. Encryption

Answer: D

Question No: 246 – (Topic 3)

Which of the following should be performed to increase the availability of IP telephony by prioritizing traffic?

  1. Subnetting

  2. NAT

  3. Quality of service

  4. NAC

Answer: C

Question No: 247 – (Topic 3)

A malicious program modified entries in the LMHOSTS file of an infected system. Which of the following protocols would have been affected by this?

  1. ICMP

  2. BGP

  3. NetBIOS

  4. DNS

Answer: C

Question No: 248 – (Topic 3)

A victim is logged onto a popular home router forum site in order to troubleshoot some router configuration issues. The router is a fairly standard configuration and has an IP address of The victim is logged into their router administrative interface in one tab and clicks a forum link in another tab. Due to clicking the forum link, the home router reboots. Which of the following attacks MOST likely occurred?

  1. Brute force password attack

  2. Cross-site request forgery

  3. Cross-site scripting

  4. Fuzzing

Answer: B

Question No: 249 – (Topic 3)

Which of the following assets is MOST likely considered for DLP?

  1. Application server content

  2. USB mass storage devices

  3. Reverse proxy

  4. Print server

Answer: B

Question No: 250 – (Topic 3)

In order to securely communicate using PGP, the sender of an email must do which of the following when sending an email to a recipient for the first time?

  1. Import the recipient’s public key

  2. Import the recipient’s private key

  3. Export the sender’s private key

  4. Export the sender’s public key

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.