[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 261-270

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 261 – (Topic 3)

A recent intrusion has resulted in the need to perform incident response procedures. The incident response team has identified audit logs throughout the network and organizational systems which hold details of the security breach. Prior to this incident, a security consultant informed the company that they needed to implement an NTP server on the network. Which of the following is a problem that the incident response team will likely encounter during their assessment?

  1. Chain of custody

  2. Tracking man hours

  3. Record time offset

  4. Capture video traffic

Answer: C

Question No: 262 – (Topic 3)

A recent computer breach has resulted in the incident response team needing to perform a forensics examination. Upon examination, the forensics examiner determines that they cannot tell which captured hard drive was from the device in question. Which of the following would have prevented the confusion experienced during this examination?

  1. Perform routine audit

  2. Chain of custody

  3. Evidence labeling

  4. Hashing the evidence

Answer: C

Question No: 263 – (Topic 3)

An IT staff member was entering the datacenter when another person tried to piggyback into the datacenter as the door was opened. While the IT staff member attempted to question the other individual by politely asking to see their badge, the individual refused and ran off into the datacenter. Which of the following should the IT staff member do NEXT?

  1. Call the police while tracking the individual on the closed circuit television system

  2. Contact the forensics team for further analysis

  3. Chase the individual to determine where they are going and what they are doing

  4. Contact the onsite physical security team with a description of the individual

Answer: D

Question No: 264 – (Topic 3)

During a recent user awareness and training session, a new staff member asks the Chief Information Security Officer (CISO) why the company does not allow personally owned devices into the company facilities. Which of the following represents how the CISO should respond?

  1. Company A views personally owned devices as creating an unacceptable risk to the organizational IT systems.

  2. Company A has begun to see zero-day attacks against personally owned devices disconnected from the network.

  3. Company A believes that staff members should be focused on their work while in the company’s facilities.

  4. Company A has seen social engineering attacks against personally owned devices and does not allow their use.

Answer: A

Question No: 265 – (Topic 3)

A user has received an email from an external source which asks for details on the company’s new product line set for release in one month. The user has a detailed spec sheet but it is marked “Internal Proprietary Information”. Which of the following should the user do NEXT?

  1. Contact their manager and request guidance on how to best move forward

  2. Contact the help desk and/or incident response team to determine next steps

  3. Provide the requestor with the email information since it will be released soon anyway

  4. Reply back to the requestor to gain their contact information and call them

Answer: B

Question No: 266 – (Topic 3)

Which of the following techniques enables a highly secured organization to assess security weaknesses in real time?

  1. Access control lists

  2. Continuous monitoring

  3. Video surveillance

  4. Baseline reporting

Answer: B

Question No: 267 – (Topic 3)

Which of the following techniques can be used to prevent the disclosure of system information resulting from arbitrary inputs when implemented properly?

  1. Fuzzing

  2. Patch management

  3. Error handling

  4. Strong passwords

Answer: C

Question No: 268 – (Topic 3)

Encryption of data at rest is important for sensitive information because of which of the following?

  1. Facilitates tier 2 support, by preventing users from changing the OS

  2. Renders the recovery of data harder in the event of user password loss

  3. Allows the remote removal of data following eDiscovery requests

  4. Prevents data from being accessed following theft of physical equipment

Answer: D

Question No: 269 – (Topic 3)

Which of the following is synonymous with a server’s certificate?

  1. Public key

  2. CRL

  3. Private key

  4. Recovery agent

Answer: A

Question No: 270 – (Topic 3)

A network administrator noticed various chain messages have been received by the company. Which of the following security controls would need to be implemented to

mitigate this issue?

  1. Anti-spam

  2. Antivirus

  3. Host-based firewalls

  4. Anti-spyware

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.