[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 531-540

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 531 – (Topic 6)

Joe, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Joe insisted that he was not aware of any company policy that prohibits the use of such web sites. Which of the following is the BEST method to deter employees from the improper use of the company’s information systems?

  1. Acceptable Use Policy

  2. Privacy Policy

  3. Security Policy

  4. Human Resource Policy

Answer: A

Question No: 532 – (Topic 6)

A compromised workstation utilized in a Distributed Denial of Service (DDOS) attack has been removed from the network and an image of the hard drive has been created.

However, the system administrator stated that the system was left unattended for several hours before the image was created. In the event of a court case, which of the following is likely to be an issue with this incident?

  1. Eye Witness

  2. Data Analysis of the hard drive

  3. Chain of custody

  4. Expert Witness

Answer: C

Question No: 533 – (Topic 6)

The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and Standard Operating Procedures documentation in order to successfully respond to future incidents. Which of the following stages of the Incident Handling process is the team working on?

  1. Lessons Learned

  2. Eradication

  3. Recovery

  4. Preparation

Answer: D

Question No: 534 – (Topic 6)

Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives?

  1. Degaussing

  2. Physical Destruction

  3. Lock up hard drives in a secure safe

  4. Wipe

Answer: B

Question No: 535 – (Topic 6)

During which of the following phases of the Incident Response process should a security administrator define and implement general defense against malware?

  1. Lessons Learned

  2. Preparation

  3. Eradication

  4. Identification

Answer: B

Question No: 536 – (Topic 6)

A company has recently implemented a high density wireless system by having a junior technician install two new access points for every access point already deployed. Users are now reporting random wireless disconnections and slow network connectivity. Which of the following is the MOST likely cause?

  1. The old APs use 802.11a

  2. Users did not enter the MAC of the new APs

  3. The new APs use MIMO

  4. A site survey was not conducted

Answer: D

Question No: 537 – (Topic 6)

A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue?

  1. The SSID broadcast is disabled.

  2. The company is using the wrong antenna type.

  3. The MAC filtering is disabled on the access point.

  4. The company is not using strong enough encryption.

Answer: A

Question No: 538 – (Topic 6)

A company is looking to reduce the likelihood of employees in the finance department being involved with money laundering. Which of the following controls would BEST mitigate this risk?

  1. Implement privacy policies

  2. Enforce mandatory vacations

  3. Implement a security policy

  4. Enforce time of day restrictions

Answer: B

Question No: 539 – (Topic 6)

A company recently experienced data loss when a server crashed due to a midday power outage. Which of the following should be used to prevent this from occurring again?

  1. Recovery procedures

  2. EMI shielding

  3. Environmental monitoring

  4. Redundancy

Answer: D

Question No: 540 – (Topic 6)

Joe, a security administrator, is concerned with users tailgating into the restricted areas. Given a limited budget, which of the following would BEST assist Joe with detecting this activity?

  1. Place a full-time guard at the entrance to confirm user identity.

  2. Install a camera and DVR at the entrance to monitor access.

  3. Revoke all proximity badge access to make users justify access.

  4. Install a motion detector near the entrance.

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.