Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 501 – (Topic 6)
Which of the following is true about the recovery agent?
-
It can decrypt messages of users who lost their private key.
-
It can recover both the private and public key of federated users.
-
It can recover and provide users with their lost or private key.
-
It can recover and provide users with their lost public key.
Answer: A
Question No: 502 – (Topic 6)
Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails resulting in system outages?
-
Risk transference
-
Change management
-
Configuration management
-
Access control revalidation
Answer: B
Question No: 503 – (Topic 6)
A review of the company’s network traffic shows that most of the malware infections are
caused by users visiting gambling and gaming websites. The security manager wants to implement a solution that will block these websites, scan all web traffic for signs of malware, and block the malware before it enters the company network. Which of the following is suited for this purpose?
-
ACL
-
IDS
-
UTM
-
Firewall
Answer: C
Question No: 504 – (Topic 6)
Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains?
Server 1: 192.168.100.6
Server 2: 192.168.100.9
Server 3: 192.169.100.20
A. /24 B. /27 C. /28 D. /29 E. /30
Answer: D
Question No: 505 – (Topic 6)
Which of the following offerings typically allows the customer to apply operating system patches?
-
Software as a service
-
Public Clouds
-
Cloud Based Storage
-
Infrastructure as a service
Answer: D
Question No: 506 – (Topic 6)
A technician is unable to manage a remote server. Which of the following ports should be opened on the firewall for remote server management? (Select TWO).
A. 22 B. 135 C. 137 D. 143 E. 443 F. 3389
Answer: A,F
Question No: 507 – (Topic 6)
Which of the following network design elements allows for many internal devices to share one public IP address?
-
DNAT
-
PAT
-
DNS
-
DMZ
Answer: B
Question No: 508 – (Topic 6)
When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes. Which of the following design elements would be implemented to comply with the security administrator’s request?
-
DMZ
-
Cloud services
-
Virtualization
-
Sandboxing
Answer: A
Question No: 509 – (Topic 6)
Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?
-
Spam filter
-
URL filter
-
Content inspection
-
Malware inspection
Answer: B
Question No: 510 – (Topic 6)
At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?
-
Configure an access list.
-
Configure spanning tree protocol.
-
Configure port security.
-
Configure loop protection.
Answer: C
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |