[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 561-570

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 561 – (Topic 6)

The act of magnetically erasing all of the data on a disk is known as:

  1. Wiping

  2. Dissolution

  3. Scrubbing

  4. Degaussing

Answer: D

Question No: 562 – (Topic 6)

LDAP and Kerberos are commonly used for which of the following?

  1. To perform queries on a directory service

  2. To store usernames and passwords for Federated Identity

  3. To sign SSL wildcard certificates for subdomains

  4. To utilize single sign-on capabilities

Answer: D

Question No: 563 – (Topic 6)

A recent audit has revealed weaknesses in the process of deploying new servers and

network devices. Which of the following practices could be used to increase the security posture during deployment? (Select TWO).

  1. Deploy a honeypot

  2. Disable unnecessary services

  3. Change default passwords

  4. Implement an application firewall

  5. Penetration testing

Answer: B,C

Question No: 564 – (Topic 6)

Joe, a network security engineer, has visibility to network traffic through network monitoring tools. However, he’s concerned that a disgruntled employee may be targeting a server containing the company’s financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion?

  1. HIDS

  2. HIPS

  3. NIPS

  4. NIDS

Answer: A

Question No: 565 – (Topic 6)

Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective?

  1. CHAP

  2. SAML

  3. Kerberos

  4. Diameter

Answer: D

Question No: 566 – (Topic 6)

Joe analyzed the following log and determined the security team should implement which of the following as a mitigation method against further attempts?

Host 192.168.1.123

[00:00:01]Successful Login: 015 192.168.1.123 : local

[00:00:03]Unsuccessful Login: 022 214.34.56.006 :RDP 192.168.1.124

[00:00:04]UnSuccessful Login: 010 214.34.56.006 :RDP 192.168.1.124

[00:00:07]UnSuccessful Login: 007 214.34.56.006 :RDP 192.168.1.124

[00:00:08]UnSuccessful Login: 003 214.34.56.006 :RDP 192.168.1.124

  1. Reporting

  2. IDS

  3. Monitor system logs

  4. Hardening

Answer: D

Question No: 567 – (Topic 6)

A computer supply company is located in a building with three wireless networks. The system security team implemented a quarterly security scan and saw the following. Which of the following is this an example of?

SSID State Channel Level

Computer AreUs1 connected 1 70dbm Computer AreUs2 connected 5 80dbm Computer AreUs3 connected 3 75dbm Computer AreUs4 connected 6 95dbm

  1. Rouge access point

  2. Near field communication

  3. Jamming

  4. Packet sniffing

Answer: A

Question No: 568 – (Topic 6)

Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles during the week. Further investigation by the system engineering team determined that a timed .exe file had been uploaded to the system control console during a visit by international contractors. Which of the following actions should Joe recommend?

  1. Create a VLAN for the SCADA

  2. Enable PKI for the MainFrame

  3. Implement patch management

  4. Implement stronger WPA2 Wireless

Answer: A

Question No: 569 – (Topic 6)

A system administrator has been instructed by the head of security to protect their data at- rest. Which of the following would provide the strongest protection?

  1. Prohibiting removable media

  2. Incorporating a full-disk encryption system

  3. Biometric controls on data center entry points

  4. A host-based intrusion detection system

Answer: B

Question No: 570 – (Topic 6)

An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-to-peer network that cannot connect to the Internet. The ISSO can update the antivirus definitions manually, but which of the following steps is MOST important?

  1. A full scan must be run on the network after the DAT file is installed.

  2. The signatures must have a hash value equal to what is displayed on the vendor site.

  3. The definition file must be updated within seven days.

  4. All users must be logged off of the network prior to the installation of the definition file.

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.