[Free] 2018(June) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 61-70

By | July 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 61 – (Topic 1)

Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms?

  1. Signature based IPS

  2. Signature based IDS

  3. Application based IPS

  4. Anomaly based IDS

Answer: D

Question No: 62 – (Topic 1)

A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?

  1. Command shell restrictions

  2. Restricted interface

  3. Warning banners

  4. Session output pipe to /dev/null

Answer: C

Question No: 63 – (Topic 1)

Which of the following protocols is used to authenticate the client and server’s digital certificate?

  1. PEAP

  2. DNS

  3. TLS

  4. ICMP

Answer: C

Question No: 64 – (Topic 1)

Which of the following can be used to mitigate risk if a mobile device is lost?

  1. Cable lock

  2. Transport encryption

  3. Voice encryption

  4. Strong passwords

Answer: D

Question No: 65 – (Topic 1)

Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?

  1. Record time offset

  2. Clean desk policy

  3. Cloud computing

  4. Routine log review

Answer: B

Question No: 66 – (Topic 1)

Which of the following is an example of multifactor authentication?

  1. Credit card and PIN

  2. Username and password

  3. Password and PIN

  4. Fingerprint and retina scan

Answer: A

Question No: 67 – (Topic 1)

After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:

‘Please only use letters and numbers on these fields’ Which of the following is this an example of?

  1. Proper error handling

  2. Proper input validation

  3. Improper input validation

  4. Improper error handling

Answer: B

Question No: 68 – (Topic 1)

Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE).

  1. Spam filter

  2. Load balancer

  3. Antivirus

  4. Proxies

  5. Firewall

  6. NIDS

  7. URL filtering

Answer: D,E,G

Question No: 69 – (Topic 1)

Several bins are located throughout a building for secure disposal of sensitive information. Which of the following does this prevent?

  1. Dumpster diving

  2. War driving

  3. Tailgating

  4. War chalking

Answer: A

Question No: 70 – (Topic 1)

Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?

  1. Application design

  2. Application security

  3. Initial baseline configuration

  4. Management of interfaces

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.