[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 511-520

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 511 – (Topic 6)

Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network printing?

  1. Port security

  2. Flood guards

  3. Loop protection

  4. Implicit deny

Answer: D

Question No: 512 – (Topic 6)

Joe, a security administrator, believes that a network breach has occurred in the datacenter as a result of a misconfigured router access list, allowing outside access to an SSH server. Which of the following should Joe search for in the log files?

  1. Failed authentication attempts

  2. Network ping sweeps

  3. Host port scans

  4. Connections to port 22

Answer: D

Question No: 513 – (Topic 6)

Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?

  1. Packet Filter Firewall

  2. Stateful Firewall

  3. Proxy Firewall

  4. Application Firewall

Answer: B

Question No: 514 – (Topic 6)

A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access?

  1. SCP

  2. SSH

  3. SFTP

  4. HTTPS

Answer: B

Question No: 515 – (Topic 6)

The network administrator has been tasked to rebuild a compromised web server. The administrator is to remove the malware and install all the necessary updates and patches. This represents which of the following stages of the Incident Handling Response?

  1. Lessons Learned

  2. Plan of action

  3. Eradication

  4. Reconstitution

Answer: C

Question No: 516 – (Topic 6)

Management has been informed of an increased number of tailgating violations into the server room. Which of the following is the BEST method of preventing future violations?

  1. Security Guards

  2. Man Traps

  3. Proximity Cards

  4. Biometrics authentication

Answer: B

Question No: 517 – (Topic 6)

Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group. Which of the following would prevent her from denying accountability?

  1. Email Encryption

  2. Steganography

  3. Non Repudiation

  4. Access Control

Answer: C

Question No: 518 – (Topic 6)

Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information. Which of the following will accomplish this task securely?

  1. Digital Signatures

  2. Hashing

  3. Secret Key

  4. Encryption

Answer: D

Question No: 519 – (Topic 6)

Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Ann ensure is open?

A. 22 B. 139 C. 443 D. 3389

Answer: D

Question No: 520 – (Topic 6)

Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:

  1. Redundant systems.

  2. Separation of duties.

  3. Layered security.

  4. Application control.

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.