Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 1 – (Topic 1)
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
-
Conduct surveys and rank the results.
-
Perform routine user permission reviews.
-
Implement periodic vulnerability scanning.
-
Disable user accounts that have not been used within the last two weeks.
Answer: B
Question No: 2 – (Topic 1)
Which of the following devices is BEST suited for servers that need to store private keys?
-
Hardware security module
-
Hardened network firewall
-
Solid state disk drive
-
Hardened host firewall
Answer: A
Question No: 3 – (Topic 1)
All of the following are valid cryptographic hash functions EXCEPT:
-
RIPEMD.
-
RC4.
-
SHA-512.
-
MD4.
Answer: B
Question No: 4 – (Topic 1)
In regards to secure coding practices, why is input validation important?
-
It mitigates buffer overflow attacks.
-
It makes the code more readable.
-
It provides an application configuration baseline.
-
It meets gray box testing standards.
Answer: A
Question No: 5 – (Topic 1)
Which of the following would be used when a higher level of security is desired for encryption key storage?
-
TACACS
-
L2TP
-
LDAP
-
TPM
Answer: D
Question No: 6 – (Topic 1)
A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?
-
Firewall
-
Application
-
IDS
-
Security
Answer: D
Question No: 7 – (Topic 1)
Which of the following MUST be updated immediately when an employee is terminated to
prevent unauthorized access?
-
Registration
-
CA
-
CRL
-
Recovery agent
Answer: C
Question No: 8 – (Topic 1)
Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?
-
Smartcard
-
Token
-
Discretionary access control
-
Mandatory access control
Answer: A
Question No: 9 – (Topic 1)
Which of the following devices would MOST likely have a DMZ interface?
-
Firewall
-
Switch
-
Load balancer
-
Proxy
Answer: A
Question No: 10 – (Topic 1)
Which of the following application security testing techniques is implemented when an automated system generates random input data?
-
Fuzzing
-
XSRF
-
Hardening
-
Input validation
Answer: A
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |