[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 311-320

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 311 – (Topic 4)

Which of the following assessment techniques would a security administrator implement to ensure that systems and software are developed properly?

  1. Baseline reporting

  2. Input validation

  3. Determine attack surface

  4. Design reviews

Answer: D

Question No: 312 – (Topic 4)

Which of the following would a security administrator implement in order to identify a problem between two applications that are not communicating properly?

  1. Protocol analyzer

  2. Baseline report

  3. Risk assessment

  4. Vulnerability scan

Answer: A

Question No: 313 – (Topic 4)

Which of the following would a security administrator implement in order to identify change from the standard configuration on a server?

  1. Penetration test

  2. Code review

  3. Baseline review

  4. Design review

Answer: C

Question No: 314 – (Topic 4)

Which of the following tools would a security administrator use in order to identify all running services throughout an organization?

  1. Architectural review

  2. Penetration test

  3. Port scanner

  4. Design review

Answer: C

Question No: 315 – (Topic 4)

Which of the following protocols provides transport security for virtual terminal emulation?

  1. TLS

  2. SSH

  3. SCP

  4. S/MIME

Answer: B

Question No: 316 – (Topic 4)

Based on information leaked to industry websites, business management is concerned that unauthorized employees are accessing critical project information for a major, well-known new product. To identify any such users, the security administrator could:

  1. Set up a honeypot and place false project documentation on an unsecure share.

  2. Block access to the project documentation using a firewall.

  3. Increase antivirus coverage of the project servers.

  4. Apply security updates and harden the OS on all project servers.

Answer: A

Question No: 317 – (Topic 4)

A set of standardized system images with a pre-defined set of applications is used to build end-user workstations. The security administrator has scanned every workstation to create a current inventory of all applications that are installed on active workstations and is documenting which applications are out-of-date and could be exploited. The security administrator is determining the:

  1. Attack surface.

  2. Application hardening effectiveness.

  3. Application baseline.

  4. OS hardening effectiveness.

Answer: A

Question No: 318 – (Topic 4)

A perimeter survey finds that the wireless network within a facility is easily reachable outside of the physical perimeter. Which of the following should be adjusted to mitigate this risk?

  1. CCMP

  2. MAC filter

  3. SSID broadcast

  4. Power level controls

Answer: D

Question No: 319 – (Topic 4)

Which of the following would verify that a threat does exist and security controls can easily be bypassed without actively testing an application?

  1. Protocol analyzer

  2. Vulnerability scan

  3. Penetration test

  4. Port scanner

Answer: B

Question No: 320 – (Topic 4)

Connections using point-to-point protocol authenticate using which of the following? (Select TWO).


  2. PAP

  3. CHAP

  4. RC4

  5. Kerberos

Answer: B,C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.