[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 361-370

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 361 – (Topic 4)

End-user awareness training for handling sensitive personally identifiable information would include secure storage and transmission of customer:

  1. Date of birth.

  2. First and last name.

  3. Phone number.

  4. Employer name.

Answer: A

Question No: 362 – (Topic 4)

Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication. Which of the following authentication methods should Jane use?

  1. WPA2-PSK

  2. WEP-PSK

  3. CCMP

  4. LEAP

Answer: D

Question No: 363 – (Topic 4)

Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privilege principles?

  1. User rights reviews

  2. Incident management

  3. Risk based controls

  4. Annual loss expectancy

Answer: A

Question No: 364 – (Topic 4)

The security officer is preparing a read-only USB stick with a document of important personal phone numbers, vendor contacts, an MD5 program, and other tools to provide to employees. At which of the following points in an incident should the officer instruct employees to use this information?

  1. Business Impact Analysis

  2. First Responder

  3. Damage and Loss Control

  4. Contingency Planning

Answer: B

Question No: 365 – (Topic 4)

To ensure proper evidence collection, which of the following steps should be preformed FIRST?

  1. Take hashes from the live system

  2. Review logs

  3. Capture the system image

  4. Copy all compromised files

Answer: C

Question No: 366 – (Topic 4)

Joe, the security administrator, has determined that one of his web servers is under attack. Which of the following can help determine where the attack originated from?

  1. Capture system image

  2. Record time offset

  3. Screenshots

  4. Network sniffing

Answer: D

Question No: 367 – (Topic 4)

Joe, the system administrator, is performing an overnight system refresh of hundreds of user computers. The refresh has a strict timeframe and must have zero downtime during business hours. Which of the following should Joe take into consideration?

  1. A disk-based image of every computer as they are being replaced.

  2. A plan that skips every other replaced computer to limit the area of affected users.

  3. An offsite contingency server farm that can act as a warm site should any issues appear.

  4. A back-out strategy planned out anticipating any unforeseen problems that may arise.

Answer: D

Question No: 368 – (Topic 4)

A program displays:

ERROR: this program has caught an exception and will now terminate.

Which of the following is MOST likely accomplished by the program’s behavior?

  1. Operating system’s integrity is maintained

  2. Program’s availability is maintained

  3. Operating system’s scalability is maintained

  4. User’s confidentiality is maintained

Answer: A

Question No: 369 – (Topic 4)

A security administrator wants to deploy a physical security control to limit an individual’s access into a sensitive area. Which of the following should be implemented?

  1. Guards

  2. CCTV

  3. Bollards

  4. Spike strip

Answer: A

Question No: 370 – (Topic 4)

A network administrator uses an RFID card to enter the datacenter, a key to open the server rack, and a username and password to logon to a server. These are examples of which of the following?

  1. Multifactor authentication

  2. Single factor authentication

  3. Separation of duties

  4. Identification

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.