[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 321-330

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 321 – (Topic 4)

Which of the following will help prevent smurf attacks?

  1. Allowing necessary UDP packets in and out of the network

  2. Disabling directed broadcast on border routers

  3. Disabling unused services on the gateway firewall

  4. Flash the BIOS with the latest firmware

Answer: B

Question No: 322 – (Topic 4)

An advantage of virtualizing servers, databases, and office applications is:

  1. Centralized management.

  2. Providing greater resources to users.

  3. Stronger access control.

  4. Decentralized management.

Answer: A

Question No: 323 – (Topic 4)

A major security risk with co-mingling of hosts with different security requirements is:

  1. Security policy violations.

  2. Zombie attacks.

  3. Password compromises.

  4. Privilege creep.

Answer: A

Question No: 324 – (Topic 4)

Which of the following attacks targets high level executives to gain company information?

  1. Phishing

  2. Whaling

  3. Vishing

  4. Spoofing

Answer: B

Question No: 325 – (Topic 4)

Which of the following can be used as an equipment theft deterrent?

  1. Screen locks

  2. GPS tracking

  3. Cable locks

  4. Whole disk encryption

Answer: C

Question No: 326 – (Topic 4)

At the outside break area, an employee, Ann, asked another employee to let her into the building because her badge is missing. Which of the following does this describe?

  1. Shoulder surfing

  2. Tailgating

  3. Whaling

  4. Impersonation

Answer: B

Question No: 327 – (Topic 4)

A company that has a mandatory vacation policy has implemented which of the following controls?

  1. Risk control

  2. Privacy control

  3. Technical control

  4. Physical control

Answer: A

Question No: 328 – (Topic 4)

Ann, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Ann should immediately implement which of the following?

  1. Acceptable Use Policy

  2. Physical security controls

  3. Technical controls

  4. Security awareness training

Answer: D

Question No: 329 – (Topic 4)

Which of the following is the MOST intrusive type of testing against a production system?

  1. White box testing

  2. War dialing

  3. Vulnerability testing

  4. Penetration testing

Answer: D

Question No: 330 – (Topic 4)

The IT department has installed new wireless access points but discovers that the signal extends far into the parking lot. Which of the following actions should be taken to correct this?

  1. Disable the SSID broadcasting

  2. Configure the access points so that MAC filtering is not used

  3. Implement WEP encryption on the access points

  4. Lower the power for office coverage only

Answer: D

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.