[Free] 2018(Aug) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 161-170

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 161 – (Topic 2)

Some customers have reported receiving an untrusted certificate warning when visiting the company’s website. The administrator ensures that the certificate is not expired and that customers have trusted the original issuer of the certificate. Which of the following could be causing the problem?

  1. The intermediate CA certificates were not installed on the server.

  2. The certificate is not the correct type for a virtual server.

  3. The encryption key used in the certificate is too short.

  4. The client’s browser is trying to negotiate SSL instead of TLS.

Answer: A

Question No: 162 – (Topic 2)

A security analyst needs to ensure all external traffic is able to access the company’s front- end servers but protect all access to internal resources. Which of the following network design elements would MOST likely be recommended?

  1. DMZ

  2. Cloud computing

  3. VLAN

  4. Virtualization

Answer: A

Question No: 163 – (Topic 2)

A company’s business model was changed to provide more web presence and now its ERM software is no longer able to support the security needs of the company. The current data center will continue to provide network and security services. Which of the following

network elements would be used to support the new business model?

  1. Software as a Service

  2. DMZ

  3. Remote access support

  4. Infrastructure as a Service

Answer: A

Question No: 164 – (Topic 2)

Which of the following network devices is used to analyze traffic between various network interfaces?

  1. Proxies

  2. Firewalls

  3. Content inspection

  4. Sniffers

Answer: D

Question No: 165 – (Topic 2)

Layer 7 devices used to prevent specific types of html tags are called:

  1. Firewalls.

  2. Content filters.

  3. Routers.

  4. NIDS.

Answer: B

Question No: 166 – (Topic 2)

A network administrator needs to provide daily network usage reports on all layer 3 devices without compromising any data while gathering the information. Which of the following would be configured to provide these reports?

  1. SNMP

  2. SNMPv3

  3. ICMP

  4. SSH

Answer: B

Question No: 167 – (Topic 2)

A security administrator has been tasked to ensure access to all network equipment is controlled by a central server such as TACACS . This type of implementation supports which of the following risk mitigation strategies?

  1. User rights and permissions review

  2. Change management

  3. Data loss prevention

  4. Implement procedures to prevent data theft

Answer: A

Question No: 168 – (Topic 2)

Company A sends a PGP encrypted file to company B. If company A used company B’s public key to encrypt the file, which of the following should be used to decrypt data at company B?

  1. Registration

  2. Public key

  3. CRLs

  4. Private key

Answer: D

Question No: 169 – (Topic 2)

Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?

  1. Biometrics

  2. PKI

  3. ACLs

  4. Kerberos

Answer: D

Question No: 170 – (Topic 2)

A corporation is looking to expand their data center but has run out of physical space in which to store hardware. Which of the following would offer the ability to expand while keeping their current data center operated by internal staff?

  1. Virtualization

  2. Subnetting

  3. IaaS

  4. SaaS

Answer: A

100% Dumps4cert Free Download!
JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
JK0-018 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com