[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 521-530

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 521 – (Topic 6)

A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents. Which of the following would be the BEST technology control to use in this scenario?

  1. Content filtering

  2. IDS

  3. Audit logs

  4. DLP

Answer: D

Question No: 522 – (Topic 6)

A company’s employees were victims of a spear phishing campaign impersonating the CEO. The company would now like to implement a solution to improve the overall security posture by assuring their employees that email originated from the CEO. Which of the following controls could they implement to BEST meet this goal?

  1. Spam filter

  2. Digital signatures

  3. Antivirus software

  4. Digital certificates

Answer: B

Question No: 523 – (Topic 6)

Which of the following is a security risk regarding the use of public P2P as a method of collaboration?

  1. Data integrity is susceptible to being compromised.

  2. Monitoring data changes induces a higher cost.

  3. Users are not responsible for data usage tracking.

  4. Limiting the amount of necessary space for data storage.

Answer: A

Question No: 524 – (Topic 6)

The method to provide end users of IT systems and applications with requirements related to acceptable use, privacy, new threats and trends, and use of social networking is:

  1. Security awareness training.

  2. BYOD security training.

  3. Role-based security training.

  4. Legal compliance training.

Answer: A

Question No: 525 – (Topic 6)

After an audit, it was discovered that the security group memberships were not properly adjusted for employees’ accounts when they moved from one role to another. Which of the following has the organization failed to properly implement? (Select TWO).

  1. Mandatory access control enforcement.

  2. User rights and permission reviews.

  3. Technical controls over account management.

  4. Account termination procedures.

  5. Management controls over account management.

  6. Incident management and response plan.

Answer: B,E

Question No: 526 – (Topic 6)

A security technician wishes to gather and analyze all Web traffic during a particular time period. Which of the following represents the BEST approach to gathering the required


  1. Configure a VPN concentrator to log all traffic destined for ports 80 and 443.

  2. Configure a proxy server to log all traffic destined for ports 80 and 443.

  3. Configure a switch to log all traffic destined for ports 80 and 443.

  4. Configure a NIDS to log all traffic destined for ports 80 and 443.

Answer: B

Question No: 527 – (Topic 6)

A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic. Which of the following would accomplish this task?

  1. Deny TCP port 68

  2. Deny TCP port 69

  3. Deny UDP port 68

  4. Deny UDP port 69

Answer: D

Question No: 528 – (Topic 6)

A company determines a need for additional protection from rogue devices plugging into physical ports around the building. Which of the following provides the highest degree of protection from unauthorized wired network access?

  1. Intrusion Prevention Systems

  2. MAC filtering

  3. Flood guards

D. 802.1x

Answer: D

Question No: 529 – (Topic 6)

The Chief Technical Officer (CTO) is worried about an increased amount of malware detected on end user’s workstations. Which of the following technologies should be recommended to detect such anomalies?

  1. NIDS

  2. Web content filter

  3. Host-based IDS

  4. Web application firewall

Answer: C

Question No: 530 – (Topic 6)

The network security engineer just deployed an IDS on the network, but the Chief Technical Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the following types of IDS has been deployed?

  1. Signature Based IDS

  2. Heuristic IDS

  3. Behavior Based IDS

  4. Anomaly Based IDS

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.