[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 471-480

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 471 – (Topic 5)

A security administrator wants to test the reliability of an application which accepts user provided parameters. The administrator is concerned with data integrity and availability. Which of the following should be implemented to accomplish this task?

  1. Secure coding

  2. Fuzzing

  3. Exception handling

  4. Input validation

Answer: B

Question No: 472 – (Topic 5)

Which of the following concepts is a term that directly relates to customer privacy considerations?

  1. Data handling policies

  2. Personally identifiable information

  3. Information classification

  4. Clean desk policies

Answer: B

Question No: 473 – (Topic 5)

Which of the following is a Data Loss Prevention (DLP) strategy and is MOST useful for securing data in use?

  1. Email scanning

  2. Content discovery

  3. Database fingerprinting

  4. Endpoint protection

Answer: D

Question No: 474 – (Topic 5)

Which of the following is a concern when encrypting wireless data with WEP?

  1. WEP displays the plain text entire key when wireless packet captures are reassembled

  2. WEP implements weak initialization vectors for key transmission

  3. WEP uses a very weak encryption algorithm

  4. WEP allows for only four pre-shared keys to be configured

Answer: B

Question No: 475 – (Topic 5)

A security administrator is tasked with calculating the total ALE on servers. In a two year period of time, a company has to replace five servers. Each server replacement has cost the company $4,000 with downtime costing $3,000. Which of the following is the ALE for the company?

A. $7,000 B. $10,000 C. $17,500 D. $35,000

Answer: C

Question No: 476 – (Topic 5)

ABC company has a lot of contractors working for them. The provisioning team does not always get notified that a contractor has left the company. Which of the following policies would prevent contractors from having access to systems in the event a contractor has left?

  1. Annual account review

  2. Account expiration policy

  3. Account lockout policy

  4. Account disablement

Answer: B

Question No: 477 – (Topic 5)

The practice of marking open wireless access points is called which of the following?

  1. War dialing

  2. War chalking

  3. War driving

  4. Evil twin

Answer: B

Question No: 478 – (Topic 5)

Multi-tenancy is a concept found in which of the following?

  1. Full disk encryption

  2. Removable media

  3. Cloud computing

  4. Data loss prevention

Answer: C

Question No: 479 – (Topic 5)

Which of the following is a common coding error in which boundary checking is not performed?

  1. Input validation

  2. Fuzzing

  3. Secure coding

  4. Cross-site scripting

Answer: A

Question No: 480 – (Topic 5)

While previously recommended as a security measure, disabling SSID broadcast is not effective against most attackers because network SSIDs are:

  1. no longer used to authenticate to most wireless networks.

  2. contained in certain wireless packets in plaintext.

  3. contained in all wireless broadcast packets by default.

  4. no longer supported in 802.11 protocols.

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.