[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 301-310

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 301 – (Topic 4)

A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO’s requirements?

  1. Username and password

  2. Retina scan and fingerprint scan

  3. USB token and PIN

  4. Proximity badge and token

Answer: C

Question No: 302 – (Topic 4)

Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended?

  1. Screen lock

  2. Voice encryption

  3. GPS tracking

  4. Device encryption

Answer: A

Question No: 303 – (Topic 4)

Which of the following security concepts can prevent a user from logging on from home during the weekends?

  1. Time of day restrictions

  2. Multifactor authentication

  3. Implicit deny

  4. Common access card

Answer: A

Question No: 304 – (Topic 4)

Which of the following would provide the STRONGEST encryption?

  1. Random one-time pad

  2. DES with a 56-bit key

  3. AES with a 256-bit key

  4. RSA with a 1024-bit key

Answer: A

Question No: 305 – (Topic 4)

During a server audit, a security administrator does not notice abnormal activity. However, a network security analyst notices connections to unauthorized ports from outside the corporate network. Using specialized tools, the network security analyst also notices hidden processes running. Which of the following has MOST likely been installed on the server?

  1. SPIM

  2. Backdoor

  3. Logic bomb

  4. Rootkit

Answer: D

Question No: 306 – (Topic 4)

A security administrator wants to ensure that the message the administrator sends out to their Chief Financial Officer (CFO) does not get changed in route. Which of the following is the administrator MOST concerned with?

  1. Data confidentiality

  2. High availability

  3. Data integrity

  4. Business continuity

Answer: C

Question No: 307 – (Topic 4)

Which of the following can be performed when an element of the company policy cannot be enforced by technical means?

  1. Develop a set of standards

  2. Separation of duties

  3. Develop a privacy policy

  4. User training

Answer: D

Question No: 308 – (Topic 4)

Timestamps and sequence numbers act as countermeasures against which of the following types of attacks?

  1. Smurf

  2. DoS

  3. Vishing

  4. Replay

Answer: D

Question No: 309 – (Topic 4)

Which of the following would be used as a secure substitute for Telnet?

  1. SSH

  2. SFTP

  3. SSL

  4. HTTPS

Answer: A

Question No: 310 – (Topic 4)

Which of the following is described as an attack against an application using a malicious file?

  1. Client side attack

  2. Spam

  3. Impersonation attack

  4. Phishing attack

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
Download 2018 Dumps4cert JK0-018 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.