Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 511 – (Topic 6)
Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network printing?
-
Port security
-
Flood guards
-
Loop protection
-
Implicit deny
Answer: D
Question No: 512 – (Topic 6)
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a result of a misconfigured router access list, allowing outside access to an SSH server. Which of the following should Joe search for in the log files?
-
Failed authentication attempts
-
Network ping sweeps
-
Host port scans
-
Connections to port 22
Answer: D
Question No: 513 – (Topic 6)
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
-
Packet Filter Firewall
-
Stateful Firewall
-
Proxy Firewall
-
Application Firewall
Answer: B
Question No: 514 – (Topic 6)
A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access?
-
SCP
-
SSH
-
SFTP
-
HTTPS
Answer: B
Question No: 515 – (Topic 6)
The network administrator has been tasked to rebuild a compromised web server. The administrator is to remove the malware and install all the necessary updates and patches. This represents which of the following stages of the Incident Handling Response?
-
Lessons Learned
-
Plan of action
-
Eradication
-
Reconstitution
Answer: C
Question No: 516 – (Topic 6)
Management has been informed of an increased number of tailgating violations into the server room. Which of the following is the BEST method of preventing future violations?
-
Security Guards
-
Man Traps
-
Proximity Cards
-
Biometrics authentication
Answer: B
Question No: 517 – (Topic 6)
Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group. Which of the following would prevent her from denying accountability?
-
Email Encryption
-
Steganography
-
Non Repudiation
-
Access Control
Answer: C
Question No: 518 – (Topic 6)
Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information. Which of the following will accomplish this task securely?
-
Digital Signatures
-
Hashing
-
Secret Key
-
Encryption
Answer: D
Question No: 519 – (Topic 6)
Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Ann ensure is open?
A. 22 B. 139 C. 443 D. 3389
Answer: D
Question No: 520 – (Topic 6)
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:
-
Redundant systems.
-
Separation of duties.
-
Layered security.
-
Application control.
Answer: C
100% Dumps4cert Free Download!
–Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |