Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 441 – (Topic 5)
After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation?
-
Information Security Awareness
-
Social Media and BYOD
-
Data Handling and Disposal
-
Acceptable Use of IT Systems
Answer: A
Question No: 442 – (Topic 5)
Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST level of security training for the executives? (Select TWO).
-
Acceptable use of social media
-
Data handling and disposal
-
Zero day exploits and viruses
-
Phishing threats and attacks
-
Clean desk and BYOD
-
Information security awareness
Answer: D,F
Question No: 443 – (Topic 5)
Which of the following provides data the best fault tolerance at the LOWEST cost?
-
Load balancing
-
Clustering
-
Server virtualization
-
RAID 6
Answer: D
Question No: 444 – (Topic 5)
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO).
-
Device encryption
-
Antivirus
-
Privacy screen
-
Cable locks
-
Remote wipe
Answer: B,D
Question No: 445 – (Topic 5)
Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?
-
Hashing
-
Stream ciphers
-
Steganography
-
Block ciphers
Answer: A
Question No: 446 – (Topic 5)
Which of the following encrypts data a single bit at a time?
-
Stream cipher
-
Steganography
-
3DES
-
Hashing
Answer: A
Question No: 447 – (Topic 5)
A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used?
-
RC4
-
DES
-
3DES
-
AES
Answer: D
Question No: 448 – (Topic 5)
Which of the following is used to verify data integrity?
-
SHA
-
3DES
-
AES
-
RSA
Answer: A
Question No: 449 – (Topic 5)
Two programmers write a new secure application for the human resources department to store personal identifiable information. The programmers make the application available to themselves using an uncommon port along with an ID and password only they know. This is an example of which of the following?
-
Root Kit
-
Spyware
-
Logic Bomb
-
Backdoor
Answer: D
Question No: 450 – (Topic 5)
Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process?
-
Separation of Duties
-
Mandatory Vacations
-
Discretionary Access Control
-
Job Rotation
Answer: A
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |