[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 441-450

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 441 – (Topic 5)

After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation?

  1. Information Security Awareness

  2. Social Media and BYOD

  3. Data Handling and Disposal

  4. Acceptable Use of IT Systems

Answer: A

Question No: 442 – (Topic 5)

Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST level of security training for the executives? (Select TWO).

  1. Acceptable use of social media

  2. Data handling and disposal

  3. Zero day exploits and viruses

  4. Phishing threats and attacks

  5. Clean desk and BYOD

  6. Information security awareness

Answer: D,F

Question No: 443 – (Topic 5)

Which of the following provides data the best fault tolerance at the LOWEST cost?

  1. Load balancing

  2. Clustering

  3. Server virtualization

  4. RAID 6

Answer: D

Question No: 444 – (Topic 5)

The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO).

  1. Device encryption

  2. Antivirus

  3. Privacy screen

  4. Cable locks

  5. Remote wipe

Answer: B,D

Question No: 445 – (Topic 5)

Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

  1. Hashing

  2. Stream ciphers

  3. Steganography

  4. Block ciphers

Answer: A

Question No: 446 – (Topic 5)

Which of the following encrypts data a single bit at a time?

  1. Stream cipher

  2. Steganography

  3. 3DES

  4. Hashing

Answer: A

Question No: 447 – (Topic 5)

A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used?

  1. RC4

  2. DES

  3. 3DES

  4. AES

Answer: D

Question No: 448 – (Topic 5)

Which of the following is used to verify data integrity?

  1. SHA

  2. 3DES

  3. AES

  4. RSA

Answer: A

Question No: 449 – (Topic 5)

Two programmers write a new secure application for the human resources department to store personal identifiable information. The programmers make the application available to themselves using an uncommon port along with an ID and password only they know. This is an example of which of the following?

  1. Root Kit

  2. Spyware

  3. Logic Bomb

  4. Backdoor

Answer: D

Question No: 450 – (Topic 5)

Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process?

  1. Separation of Duties

  2. Mandatory Vacations

  3. Discretionary Access Control

  4. Job Rotation

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.