Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 121 – (Topic 2)
Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this goal?
-
A host-based intrusion prevention system
-
A host-based firewall
-
Antivirus update system
-
A network-based intrusion detection system
Answer: B
Question No: 122 – (Topic 2)
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?
-
Firewall
-
Switch
-
URL content filter
-
Spam filter
Answer: C
Question No: 123 – (Topic 2)
Pete, the system administrator, wishes to monitor and limit users’ access to external websites. Which of the following would BEST address this?
-
Block all traffic on port 80.
-
Implement NIDS.
-
Use server load balancers.
-
Install a proxy server.
Answer: D
Question No: 124 – (Topic 2)
Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?
-
PAT
-
NAP
-
DNAT
-
NAC
Answer: A
Question No: 125 – (Topic 2)
Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability?
-
Twofish
-
Diffie-Hellman
-
ECC
-
RSA
Answer: C
Question No: 126 – (Topic 2)
Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach?
A. $1,500 B. $3,750 C. $15,000 D. $75,000
Answer: B
Question No: 127 – (Topic 2)
Methods to test the responses of software and web applications to unusual or unexpected inputs is known as:
-
Brute force.
-
HTML encoding.
-
Web crawling.
-
Fuzzing.
Answer: D
Question No: 128 – (Topic 2)
Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?
-
TCP 23
-
UDP 69
-
TCP 22
-
TCP 21
Answer: C
Question No: 129 – (Topic 2)
Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent?
-
Warm site
-
Load balancing
-
Clustering
-
RAID
Answer: C
Question No: 130 – (Topic 2)
Which statement is TRUE about the operation of a packet sniffer?
-
It can only have one interface on a management network.
-
They are required for firewall operation and stateful inspection.
-
The Ethernet card must be placed in promiscuous mode.
-
It must be placed on a single virtual LAN interface.
Answer: C
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |