Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 61 – (Topic 1)
Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms?
-
Signature based IPS
-
Signature based IDS
-
Application based IPS
-
Anomaly based IDS
Answer: D
Question No: 62 – (Topic 1)
A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?
-
Command shell restrictions
-
Restricted interface
-
Warning banners
-
Session output pipe to /dev/null
Answer: C
Question No: 63 – (Topic 1)
Which of the following protocols is used to authenticate the client and server’s digital certificate?
-
PEAP
-
DNS
-
TLS
-
ICMP
Answer: C
Question No: 64 – (Topic 1)
Which of the following can be used to mitigate risk if a mobile device is lost?
-
Cable lock
-
Transport encryption
-
Voice encryption
-
Strong passwords
Answer: D
Question No: 65 – (Topic 1)
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
-
Record time offset
-
Clean desk policy
-
Cloud computing
-
Routine log review
Answer: B
Question No: 66 – (Topic 1)
Which of the following is an example of multifactor authentication?
-
Credit card and PIN
-
Username and password
-
Password and PIN
-
Fingerprint and retina scan
Answer: A
Question No: 67 – (Topic 1)
After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:
‘Please only use letters and numbers on these fields’ Which of the following is this an example of?
-
Proper error handling
-
Proper input validation
-
Improper input validation
-
Improper error handling
Answer: B
Question No: 68 – (Topic 1)
Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE).
-
Spam filter
-
Load balancer
-
Antivirus
-
Proxies
-
Firewall
-
NIDS
-
URL filtering
Answer: D,E,G
Question No: 69 – (Topic 1)
Several bins are located throughout a building for secure disposal of sensitive information. Which of the following does this prevent?
-
Dumpster diving
-
War driving
-
Tailgating
-
War chalking
Answer: A
Question No: 70 – (Topic 1)
Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?
-
Application design
-
Application security
-
Initial baseline configuration
-
Management of interfaces
Answer: C
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |