[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 331-340

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 331 – (Topic 4)

The helpdesk reports increased calls from clients reporting spikes in malware infections on their systems. Which of the following phases of incident response is MOST appropriate as a FIRST response?

  1. Recovery

  2. Follow-up

  3. Validation

  4. Identification

  5. Eradication

  6. Containment

Answer: D

Question No: 332 – (Topic 4)

Which of the following protocols would be used to verify connectivity between two remote devices at the HIGHEST level of the OSI model?

  1. ICMP

  2. IPSec

  3. SCP

  4. TCP

Answer: C

Question No: 333 – (Topic 4)

Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?

  1. Protocol analyzer

  2. Load balancer

  3. VPN concentrator

  4. Web security gateway

Answer: B

Question No: 334 – (Topic 4)

Which of the following uses port 22 by default? (Select THREE).

  1. SSH

  2. SSL

  3. TLS

  4. SFTP

  5. SCP

  6. FTPS

  7. SMTP

  8. SNMP

Answer: A,D,E

Question No: 335 – (Topic 4)

Ann, a software developer, has installed some code to reactivate her account one week after her account has been disabled. Which of the following is this an example of? (Select TWO).

  1. Rootkit

  2. Logic Bomb

  3. Botnet

  4. Backdoor

  5. Spyware

Answer: B,D

Question No: 336 – (Topic 4)

The string: ‘ or 1=1- –

represents which of the following?

  1. Bluejacking

  2. Rogue access point

  3. SQL Injection

  4. Client-side attacks

Answer: C

Question No: 337 – (Topic 4)

Joe, an administrator, installs a web server on the Internet that performs credit card transactions for customer payments. Joe also sets up a second web server that looks like the first web server. However, the second server contains fabricated files and folders made to look like payments were processed on this server but really were not. Which of the following is the second server?

  1. DMZ

  2. Honeynet

  3. VLAN

  4. Honeypot

Answer: D

Question No: 338 – (Topic 4)

Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?

  1. Security logs

  2. Protocol analyzer

  3. Audit logs

  4. Honeypot

Answer: D

Question No: 339 – (Topic 4)

Which of the following should Joe, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from his company?

  1. Privacy Policy

  2. Least Privilege

  3. Acceptable Use

  4. Mandatory Vacations

Answer: D

Question No: 340 – (Topic 4)

Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for multicast packets from the switches on the network. After investigation, she discovers that this is normal activity for her network. Which of the following BEST describes these results?

  1. True negatives

  2. True positives

  3. False positives

  4. False negatives

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.