Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 311 – (Topic 4)
Which of the following assessment techniques would a security administrator implement to ensure that systems and software are developed properly?
-
Baseline reporting
-
Input validation
-
Determine attack surface
-
Design reviews
Answer: D
Question No: 312 – (Topic 4)
Which of the following would a security administrator implement in order to identify a problem between two applications that are not communicating properly?
-
Protocol analyzer
-
Baseline report
-
Risk assessment
-
Vulnerability scan
Answer: A
Question No: 313 – (Topic 4)
Which of the following would a security administrator implement in order to identify change from the standard configuration on a server?
-
Penetration test
-
Code review
-
Baseline review
-
Design review
Answer: C
Question No: 314 – (Topic 4)
Which of the following tools would a security administrator use in order to identify all running services throughout an organization?
-
Architectural review
-
Penetration test
-
Port scanner
-
Design review
Answer: C
Question No: 315 – (Topic 4)
Which of the following protocols provides transport security for virtual terminal emulation?
-
TLS
-
SSH
-
SCP
-
S/MIME
Answer: B
Question No: 316 – (Topic 4)
Based on information leaked to industry websites, business management is concerned that unauthorized employees are accessing critical project information for a major, well-known new product. To identify any such users, the security administrator could:
-
Set up a honeypot and place false project documentation on an unsecure share.
-
Block access to the project documentation using a firewall.
-
Increase antivirus coverage of the project servers.
-
Apply security updates and harden the OS on all project servers.
Answer: A
Question No: 317 – (Topic 4)
A set of standardized system images with a pre-defined set of applications is used to build end-user workstations. The security administrator has scanned every workstation to create a current inventory of all applications that are installed on active workstations and is documenting which applications are out-of-date and could be exploited. The security administrator is determining the:
-
Attack surface.
-
Application hardening effectiveness.
-
Application baseline.
-
OS hardening effectiveness.
Answer: A
Question No: 318 – (Topic 4)
A perimeter survey finds that the wireless network within a facility is easily reachable outside of the physical perimeter. Which of the following should be adjusted to mitigate this risk?
-
CCMP
-
MAC filter
-
SSID broadcast
-
Power level controls
Answer: D
Question No: 319 – (Topic 4)
Which of the following would verify that a threat does exist and security controls can easily be bypassed without actively testing an application?
-
Protocol analyzer
-
Vulnerability scan
-
Penetration test
-
Port scanner
Answer: B
Question No: 320 – (Topic 4)
Connections using point-to-point protocol authenticate using which of the following? (Select TWO).
-
RIPEMD
-
PAP
-
CHAP
-
RC4
-
Kerberos
Answer: B,C
100% Dumps4cert Free Download!
–Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |