[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 371-380

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 371 – (Topic 4)

Which of the following results in datacenters with failed humidity controls? (Select TWO).

  1. Excessive EMI

  2. Electrostatic charge

  3. Improper ventilation

  4. Condensation

  5. Irregular temperature

Answer: B,D

Question No: 372 – (Topic 4)

An online store wants to protect user credentials and credit card information so that customers can store their credit card information and use their card for multiple separate transactions. Which of the following database designs provides the BEST security for the online store?

  1. Use encryption for the credential fields and hash the credit card field

  2. Encrypt the username and hash the password

  3. Hash the credential fields and use encryption for the credit card field

  4. Hash both the credential fields and the credit card field

Answer: C

Question No: 373 – (Topic 4)

A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales department?

  1. Time of day restrictions

  2. Group based privileges

  3. User assigned privileges

  4. Domain admin restrictions

Answer: B

Question No: 374 – (Topic 4)

A security administrator is reviewing the below output from a password auditing tool:


@pW1. S3cU4

Which of the following additional policies should be implemented based on the tool’s output?

  1. Password age

  2. Password history

  3. Password length

  4. Password complexity

Answer: C

Question No: 375 – (Topic 4)

Joe, a user, in a coffee shop is checking his email over a wireless network. An attacker records the temporary credentials being passed to Joe’s browser. The attacker later uses the credentials to impersonate Joe and creates SPAM messages. Which of the following attacks allows for this impersonation?

  1. XML injection

  2. Directory traversal

  3. Header manipulation

  4. Session hijacking

Answer: D

Question No: 376 – (Topic 4)

A security architect wishes to implement a wireless network with connectivity to the company’s internal network. Before they inform all employees that this network is being put in place, the architect wants to roll it out to a small test segment. Which of the following allows for greater secrecy about this network during this initial phase of implementation?

  1. Disabling SSID broadcasting

  2. Implementing WPA2 – TKIP

  3. Implementing WPA2 – CCMP

  4. Filtering test workstations by MAC address

Answer: A

Question No: 377 – (Topic 4)

Digital certificates can be used to ensure which of the following? (Select TWO).

  1. Availability

  2. Confidentiality

  3. Verification

  4. Authorization

  5. Non-repudiation

Answer: C,E

Question No: 378 – (Topic 4)

A network administrator is looking for a way to automatically update company browsers so they import a list of root certificates from an online source. This online source will then be responsible for tracking which certificates are to be trusted or not trusted. Which of the following BEST describes the service that should be implemented to meet these requirements?

  1. Trust model

  2. Key escrow

  3. OCSP

  4. PKI

Answer: A

Question No: 379 – (Topic 4)

A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on which of the following?

  1. Peer to Peer

  2. Mobile devices

  3. Social networking

  4. Personally owned devices

Answer: C

Question No: 380 – (Topic 4)

A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates. Which of the following processes could MOST effectively mitigate these risks?

  1. Application hardening

  2. Application change management

  3. Application patch management

  4. Application firewall review

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.