Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 11 – (Topic 1)
Which of the following can be used by a security administrator to successfully recover a user’s forgotten password on a password protected file?
-
Cognitive password
-
Password sniffing
-
Brute force
-
Social engineering
Answer: C
Question No: 12 – (Topic 1)
A security administrator wants to check user password complexity. Which of the following is the BEST tool to use?
-
Password history
-
Password logging
-
Password cracker
-
Password hashing
Answer: C
Question No: 13 – (Topic 1)
Certificates are used for: (Select TWO).
-
Client authentication.
-
WEP encryption.
-
Access control lists.
-
Code signing.
-
Password hashing.
Answer: A,D
Question No: 14 – (Topic 1)
Which of the following is a hardware based encryption device?
-
EFS
-
TrueCrypt
-
TPM
-
SLE
Answer: C
Question No: 15 – (Topic 1)
Which of the following BEST describes a protective countermeasure for SQL injection?
-
Eliminating cross-site scripting vulnerabilities
-
Installing an IDS to monitor network traffic
-
Validating user input in web applications
-
Placing a firewall between the Internet and database servers
Answer: C
Question No: 16 – (Topic 1)
Which of the following MOST interferes with network-based detection techniques?
-
Mime-encoding
-
SSL
-
FTP
-
Anonymous email accounts
Answer: B
Question No: 17 – (Topic 1)
A certificate authority takes which of the following actions in PKI?
-
Signs and verifies all infrastructure messages
-
Issues and signs all private keys
-
Publishes key escrow lists to CRLs
-
Issues and signs all root certificates
Answer: D
Question No: 18 – (Topic 1)
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?
-
Malicious code on the local system
-
Shoulder surfing
-
Brute force certificate cracking
-
Distributed dictionary attacks
Answer: A
Question No: 19 – (Topic 1)
Separation of duties is often implemented between developers and administrators in order to separate which of the following?
-
More experienced employees from less experienced employees
-
Changes to program code and the ability to deploy to production
-
Upper level management users from standard development employees
-
The network access layer from the application access layer
Answer: B
Question No: 20 – (Topic 1)
A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?
-
The request needs to be sent to the incident management team.
-
The request needs to be approved through the incident management process.
-
The request needs to be approved through the change management process.
-
The request needs to be sent to the change management team.
Answer: C
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |