Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 71 – (Topic 1)
Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?
-
Acceptable Use Policy
-
Physical security controls
-
Technical controls
-
Security awareness training
Answer: D
Question No: 72 – (Topic 1)
Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task?
-
HIDS
-
Firewall
-
NIPS
-
Spam filter
Answer: C
Question No: 73 – (Topic 1)
Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate?
-
War dialing
-
War chalking
-
War driving
-
Bluesnarfing
Answer: A
Question No: 74 – (Topic 1)
Users at a company report that a popular news website keeps taking them to a web page with derogatory content. This is an example of which of the following?
-
Evil twin
-
DNS poisoning
-
Vishing
-
Session hijacking
Answer: B
Question No: 75 – (Topic 1)
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?
-
CRL
-
Non-repudiation
-
Trust models
-
Recovery agents
Answer: B
Question No: 76 – (Topic 1)
Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server?
-
HIPS
-
NIDS
-
HIDS
-
NIPS
Answer: A
Question No: 77 – (Topic 1)
Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished?
-
Create a VLAN without a default gateway.
-
Remove the network from the routing table.
-
Create a virtual switch.
-
Commission a stand-alone switch.
Answer: C
Question No: 78 – (Topic 1)
A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control?
-
Implicit deny
-
Role-based Access Control
-
Mandatory Access Controls
-
Least privilege
Answer: C
Question No: 79 – (Topic 1)
A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?
-
20
-
21
-
22
-
23
Answer: B
Question No: 80 – (Topic 1)
Which of the following could cause a browser to display the message below?
“The security certificate presented by this website was issued for a different website’s address.”
-
The website certificate was issued by a different CA than what the browser recognizes in its trusted CAs.
-
The website is using a wildcard certificate issued for the company’s domain.
-
HTTPS://127.0.01 was used instead of HTTPS://localhost.
-
The website is using an expired self signed certificate.
Answer: C
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |