Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 291 – (Topic 3)
An administrator notices that former temporary employees’ accounts are still active on a domain. Which of the following can be implemented to increase security and prevent this from happening?
-
Implement a password expiration policy.
-
Implement an account expiration date for permanent employees.
-
Implement time of day restrictions for all temporary employees.
-
Run a last logon script to look for inactive accounts.
Answer: D
Question No: 292 – (Topic 3)
A trojan was recently discovered on a server. There are now concerns that there has been a security breach that allows unauthorized people to access data. The administrator should be looking for the presence of a/an:
-
Logic bomb.
-
Backdoor.
-
Adware application.
-
Rootkit.
Answer: B
Question No: 293 – (Topic 3)
Which of the following protocols uses TCP instead of UDP and is incompatible with all previous versions?
-
TACACS
-
XTACACS
-
RADIUS
-
TACACS
Answer: D
Question No: 294 – (Topic 3)
Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE).
-
RC4
-
3DES
-
AES
-
MD5
-
PGP
-
Blowfish
Answer: B,C,F
Question No: 295 DRAG DROP – (Topic 3)
Drag and drop the correct protocol to its default port.
Answer:
Question No: 296 DRAG DROP – (Topic 3)
A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.
Answer:
Question No: 297 – (Topic 3)
Which of the following must be kept secret for a public key infrastructure to remain secure?
-
Certificate Authority
-
Certificate revocation list
-
Public key ring
-
Private key
Answer: D
Question No: 298 – (Topic 3)
Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?
-
Protocol filter
-
Load balancer
-
NIDS
-
Layer 7 firewall
Answer: D
Question No: 299 – (Topic 3)
Which of the following is best practice to put at the end of an ACL?
-
Implicit deny
-
Time of day restrictions
-
Implicit allow
-
SNMP string
Answer: A
Question No: 300 – (Topic 3)
An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?
-
TCP/IP
-
SSL
-
SCP
-
SSH
Answer: B
Topic 4, Volume D
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |