[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 481-490

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 481 – (Topic 5)

One of the most consistently reported software security vulnerabilities that leads to major exploits is:

  1. Lack of malware detection.

  2. Attack surface decrease.

  3. Inadequate network hardening.

  4. Poor input validation.

Answer: D

Question No: 482 – (Topic 5)

Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?

  1. PKI

  2. ACL

  3. CA

  4. CRL

Answer: D

Question No: 483 – (Topic 5)

One of the most basic ways to protect the confidentiality of data on a laptop in the event the device is physically stolen is to implement which of the following?

  1. File level encryption with alphanumeric passwords

  2. Biometric authentication and cloud storage

  3. Whole disk encryption with two-factor authentication

  4. BIOS passwords and two-factor authentication

Answer: C

Question No: 484 – (Topic 5)

Users report that after downloading several applications, their systems’ performance has noticeably decreased. Which of the following would be used to validate programs prior to installing them?

  1. Whole disk encryption

  2. SSH

  3. Telnet

  4. MD5

Answer: D

Question No: 485 – (Topic 5)

Ann, a security analyst, has been notified that trade secrets are being leaked from one of the executives in the corporation. When reviewing this executive’s laptop she notices several pictures of the employee’s pets are on the hard drive and on a cloud storage network. When Ann hashes the images on the hard drive against the hashes on the cloud network they do not match. Which of the following describes how the employee is leaking these secrets?

  1. Social engineering

  2. Steganography

  3. Hashing

  4. Digital signatures

Answer: B

Question No: 486 – (Topic 5)

A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to connect to it. Only after an authorized client has connected and the hacker was able to capture the client handshake with the AP can the hacker begin a brute force attack to discover the encryption key. Which of the following attacks is taking place?

  1. IV attack

  2. WEP cracking

  3. WPA cracking

  4. Rogue AP

Answer: C

Question No: 487 – (Topic 5)

Which of the following protocols is used by IPv6 for MAC address resolution?

  1. NDP

  2. ARP

  3. DNS

  4. NCP

Answer: A

Question No: 488 – (Topic 5)

Which of the following provides dedicated hardware-based cryptographic functions to an operating system and its applications running on laptops and desktops?

  1. TPM

  2. HSM

  3. CPU

  4. FPU

Answer: A

Question No: 489 – (Topic 5)

Which of the following tests a number of security controls in the least invasive manner?

  1. Vulnerability scan

  2. Threat assessment

  3. Penetration test

  4. Ping sweep

Answer: A

Question No: 490 – (Topic 5)

When using PGP, which of the following should the end user protect from compromise? (Select TWO).

  1. Private key

  2. CRL details

  3. Public key

  4. Key password

  5. Key escrow

  6. Recovery agent

Answer: A,D

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.