[Free] 2018(June) Ensurepass CompTIA JK0-018 Dumps with VCE and PDF 191-200

Ensurepass.com : Ensure you pass the IT Exams
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 191 – (Topic 2)

Elastic cloud computing environments often reuse the same physical hardware for multiple customers over time as virtual machines are instantiated and deleted. This has important implications for which of the following data security concerns?

  1. Hardware integrity

  2. Data confidentiality

  3. Availability of servers

  4. Integrity of data

Answer: B

Question No: 192 – (Topic 2)

When implementing fire suppression controls in a datacenter it is important to:

  1. Select a fire suppression system which protects equipment but may harm technicians.

  2. Ensure proper placement of sprinkler lines to avoid accidental leakage onto servers.

  3. Integrate maintenance procedures to include regularly discharging the system.

  4. Use a system with audible alarms to ensure technicians have 20 minutes to evacuate.

Answer: B

Question No: 193 – (Topic 2)

Vendors typically ship software applications with security settings disabled by default to ensure a wide range of interoperability with other applications and devices. A security administrator should perform which of the following before deploying new software?

  1. Application white listing

  2. Network penetration testing

  3. Application hardening

  4. Input fuzzing testing

Answer: C

Question No: 194 – (Topic 2)

A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?

  1. Implement a virtual firewall

  2. Install HIPS on each VM

  3. Virtual switches with VLANs

  4. Develop a patch management guide

Answer: C

Question No: 195 – (Topic 2)

Mandatory vacations are a security control which can be used to uncover which of the following?

  1. Fraud committed by a system administrator

  2. Poor password security among users

  3. The need for additional security staff

  4. Software vulnerabilities in vendor code

Answer: A

Question No: 196 – (Topic 2)

Each server on a subnet is configured to only allow SSH access from the administrator’s workstation. Which of the following BEST describes this implementation?

  1. Host-based firewalls

  2. Network firewalls

  3. Network proxy

  4. Host intrusion prevention

Answer: A

Question No: 197 – (Topic 2)

During a security assessment, an administrator wishes to see which services are running on a remote server. Which of the following should the administrator use?

  1. Port scanner

  2. Network sniffer

  3. Protocol analyzer

  4. Process list

Answer: A

Question No: 198 – (Topic 2)

In which of the following categories would creating a corporate privacy policy, drafting acceptable use policies, and group based access control be classified?

  1. Security control frameworks

  2. Best practice

  3. Access control methodologies

  4. Compliance activity

Answer: B

Question No: 199 – (Topic 2)

Disabling unnecessary services, restricting administrative access, and enabling auditing controls on a server are forms of which of the following?

  1. Application patch management

  2. Cross-site scripting prevention

  3. Creating a security baseline

  4. System hardening

Answer: D

Question No: 200 – (Topic 2)

A system administrator has noticed vulnerability on a high impact production server. A recent update was made available by the vendor that addresses the vulnerability but requires a reboot of the system afterwards. Which of the following steps should the system administrator implement to address the vulnerability?

  1. Test the update in a lab environment, schedule downtime to install the patch, install the patch and reboot the server and monitor for any changes

  2. Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the patch, and monitor for any changes

  3. Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the update, reboot the server, and monitor for any changes

  4. Backup the server, schedule downtime to install the patch, installs the patch and monitor for any changes

Answer: C

Topic 3, Volume C

100% Ensurepass Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Ensurepass Free Guaranteed!
JK0-018 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com