Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 461 – (Topic 5)
An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files should be copied from srv4 to accomplish this?
-
certificate, private key, and intermediate certificate chain
-
certificate, intermediate certificate chain, and root certificate
-
certificate, root certificate, and certificate signing request
-
certificate, public key, and certificate signing request
Answer: A
Question No: 462 – (Topic 5)
When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com. Which of the following BEST describes this type of record?
-
DNSSEC record
-
IPv4 DNS record
-
IPSEC DNS record
-
IPv6 DNS record
Answer: D
Question No: 463 – (Topic 5)
Which of the following practices reduces the management burden of access management?
-
Password complexity policies
-
User account audit
-
Log analysis and review
-
Group based privileges
Answer: D
Question No: 464 – (Topic 5)
Which of the following helps to apply the proper security controls to information?
-
Data classification
-
Deduplication
-
Clean desk policy
-
Encryption
Answer: A
Question No: 465 – (Topic 5)
Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash?
-
Input validation
-
Exception handling
-
Application hardening
-
Fuzzing
Answer: D
Question No: 466 – (Topic 5)
Which of the following types of security services are used to support authentication for remote users and devices?
-
Biometrics
-
HSM
-
RADIUS
-
TACACS
Answer: C
Question No: 467 – (Topic 5)
A Chief Information Security Officer (CISO) is tasked with outsourcing the analysis of security logs. These will need to still be reviewed on a regular basis to ensure the security of the company has not been breached. Which of the following cloud service options would support this requirement?
-
SaaS
-
MaaS
-
IaaS
-
PaaS
Answer: B
Question No: 468 – (Topic 5)
A security administrator needs a locally stored record to remove the certificates of a terminated employee. Which of the following describes a service that could meet these requirements?
-
OCSP
-
PKI
-
CA
-
CRL
Answer: D
Question No: 469 – (Topic 5)
A security analyst informs the Chief Executive Officer (CEO) that a security breach has just occurred. This results in the Risk Manager and Chief Information Officer (CIO) being caught unaware when the CEO asks for further information. Which of the following strategies should be implemented to ensure the Risk Manager and CIO are not caught unaware in the future?
-
Procedure and policy management
-
Chain of custody management
-
Change management
-
Incident management
Answer: D
Question No: 470 – (Topic 5)
Which of the following relies on the use of shared secrets to protect communication?
-
RADIUS
-
Kerberos
-
PKI
-
LDAP
Answer: A
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |