[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 341-350

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 341 – (Topic 4)

Joe, a security analyst, asks each employee of an organization to sign a statement saying that they understand how their activities may be monitored. Which of the following BEST describes this statement? (Select TWO).

  1. Acceptable use policy

  2. Risk acceptance policy

  3. Privacy policy

  4. Email policy

  5. Security policy

Answer: A,C

Question No: 342 – (Topic 4)

A process in which the functionality of an application is tested without any knowledge of the internal mechanisms of the application is known as:

  1. Black box testing

  2. White box testing

  3. Black hat testing

  4. Gray box testing

Answer: A

Question No: 343 – (Topic 4)

Which of the following tools would allow Ann, the security administrator, to be able to BEST quantify all traffic on her network?

  1. Honeypot

  2. Port scanner

  3. Protocol analyzer

  4. Vulnerability scanner

Answer: C

Question No: 344 – (Topic 4)

Which of the following should an administrator implement to research current attack methodologies?

  1. Design reviews

  2. Honeypot

  3. Vulnerability scanner

  4. Code reviews

Answer: B

Question No: 345 – (Topic 4)

Which of the following consists of peer assessments that help identify security threats and vulnerabilities?

  1. Risk assessment

  2. Code reviews

  3. Baseline reporting

  4. Alarms

Answer: B

Question No: 346 – (Topic 4)

Ann is starting a disaster recovery program. She has gathered specifics and team members for a meeting on site. Which of the following types of tests is this?

  1. Structured walk through

  2. Full Interruption test

  3. Check list test

  4. Table top exercise

Answer: A

Question No: 347 – (Topic 4)

An internal auditing team would like to strengthen the password policy to support special characters. Which of the following types of password controls would achieve this goal?

  1. Add reverse encryption

  2. Password complexity

  3. Increase password length

  4. Allow single sign on

Answer: B

Question No: 348 – (Topic 4)

Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks?

  1. Intrusion Detection System

  2. Flood Guard Protection

  3. Web Application Firewall

  4. URL Content Filter

Answer: C

Question No: 349 – (Topic 4)

Ann, the software security engineer, works for a major software vendor. Which of the following practices should be implemented to help prevent race conditions, buffer overflows, and other similar vulnerabilities prior to each production release?

  1. Product baseline report

  2. Input validation

  3. Patch regression testing

  4. Code review

Answer: D

Question No: 350 – (Topic 4)

Ann, a security analyst, is preparing for an upcoming security audit. To ensure that she identifies unapplied security controls and patches without attacking or compromising the system, Ann would use which of the following?

  1. Vulnerability scanning

  2. SQL injection

  3. Penetration testing

  4. Antivirus update

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.