Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 541 – (Topic 6)
It is important to staff who use email messaging to provide PII to others on a regular basis to have confidence that their messages are not intercepted or altered during transmission. They are concerned about which of the following types of security control?
-
Integrity
-
Safety
-
Availability
-
Confidentiality
Answer: A
Question No: 542 – (Topic 6)
A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security controls?
-
Integrity
-
Availability
-
Confidentiality
-
Safety
Answer: D
Question No: 543 – (Topic 6)
A security engineer is reviewing log data and sees the output below: POST: /payload.php HTTP/1.1
HOST: localhost Accept: */*
*******
HTTP/1.1 403 Forbidden Connection: close
Log: Access denied with 403. Pattern matches form bypass
Which of the following technologies was MOST likely being used to generate this log?
-
Host-based Intrusion Detection System
-
Web application firewall
-
Network-based Intrusion Detection System
-
Stateful Inspection Firewall
-
URL Content Filter
Answer: B
Question No: 544 – (Topic 6)
A security team has identified that the wireless signal is broadcasting into the parking lot. To reduce the risk of an attack against the wireless network from the parking lot, which of the following controls should be used? (Select TWO).
-
Antenna placement
-
Interference
-
Use WEP
-
Single Sign on
-
Disable the SSID
-
Power levels
Answer: A,F
Question No: 545 – (Topic 6)
An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to integrate the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?
-
Unified Threat Management
-
Virtual Private Network
-
Single sign on
-
Role-based management
Answer: A
Question No: 546 – (Topic 6)
Which of the following would allow the organization to divide a Class C IP address range into several ranges?
-
DMZ
-
Virtual LANs
-
NAT
-
Subnetting
Answer: D
Question No: 547 – (Topic 6)
A company’s legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO).
-
IPv6
-
SFTP
-
IPSec
-
SSH
-
IPv4
Answer: A,C
Question No: 548 – (Topic 6)
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network.
Which of the following types of technologies will BEST address this scenario?
-
Application Firewall
-
Anomaly Based IDS
-
Proxy Firewall
-
Signature IDS
Answer: B
Question No: 549 – (Topic 6)
A security administrator wishes to increase the security of the wireless network. Which of the following BEST addresses this concern?
-
Change the encryption from TKIP-based to CCMP-based.
-
Set all nearby access points to operate on the same channel.
-
Configure the access point to use WEP instead of WPA2.
-
Enable all access points to broadcast their SSIDs.
Answer: A
Question No: 550 – (Topic 6)
Which of the following describes the purpose of an MOU?
-
Define interoperability requirements
-
Define data backup process
-
Define onboard/offboard procedure
-
Define responsibilities of each party
Answer: D
100% Dumps4cert Free Download!
–Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |