[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 411-420

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 411 – (Topic 5)

A security administrator has been tasked with setting up a new internal wireless network that must use end to end TLS. Which of the following may be used to meet this objective?

  1. WPA

  2. HTTPS

  3. WEP

  4. WPA 2

Answer: D

Question No: 412 – (Topic 5)

After viewing wireless traffic, an attacker notices the following networks are being broadcasted by local access points:

Corpnet Coffeeshop FreePublicWifi

Using this information the attacker spoofs a response to make nearby laptops connect back to a malicious device. Which of the following techniques are used above? (Select TWO).

  1. Blue snarfing

  2. Evil twin

  3. Packet sniffing

  4. War dialing

  5. Rogue access point

Answer: B,C

Question No: 413 – (Topic 5)

A server administrator notes that a legacy application often stops running due to a memory error. When reviewing the debugging logs, they notice code being run calling an internal process to exploit the machine. Which of the following attacks does this describe?

  1. Zero-day

  2. Buffer overflow

  3. Cross site scripting

  4. Malicious add-on

Answer: B

Question No: 414 – (Topic 5)

Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed?

  1. Bollards

  2. Video surveillance

  3. Proximity readers

  4. Fencing

Answer: B

Question No: 415 – (Topic 5)

After running into the data center with a vehicle, attackers were able to enter through the hole in the building and steal several key servers in the ensuing chaos. Which of the following security measures can be put in place to mitigate the issue from occurring in the future?

  1. Fencing

  2. Proximity readers

  3. Video surveillance

  4. Bollards

Answer: D

Question No: 416 – (Topic 5)

Which of the following ciphers would be BEST used to encrypt streaming video?

  1. RSA

  2. RC4

  3. SHA1

  4. 3DES

Answer: B

Question No: 417 – (Topic 5)

A CA is compromised and attacks start distributing maliciously signed software updates. Which of the following can be used to warn users about the malicious activity?

  1. Key escrow

  2. Private key verification

  3. Public key verification

  4. Certificate revocation list

Answer: D

Question No: 418 – (Topic 5)

After encrypting all laptop hard drives, an executive officer’s laptop has trouble booting to the operating system. Now that it is successfully encrypted the helpdesk cannot retrieve the data. Which of the following can be used to decrypt the information for retrieval?

  1. Recovery agent

  2. Private key

  3. Trust models

  4. Public key

Answer: A

Question No: 419 – (Topic 5)

Which of the following devices is MOST likely being used when processing the following?



  1. Firewall

  2. NIPS

  3. Load balancer

  4. URL filter

Answer: A

Question No: 420 – (Topic 5)

The security administrator at ABC company received the following log information from an external party:

10:45:01 EST, SRC, DST, ALERT, Directory traversal

10:45:02 EST, SRC, DST, ALERT, Account brute force

10:45:03 EST, SRC, DST, ALERT, Port scan

The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company’s security administrator is unable to determine the origin of the attack?

  1. A NIDS was used in place of a NIPS.

  2. The log is not in UTC.

  3. The external party uses a firewall.

  4. ABC company uses PAT.

Answer: D

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.