Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 41 – (Topic 1)

Data execution prevention is a feature in most operating systems intended to protect against which type of attack?

  1. Cross-site scripting

  2. Buffer overflow

  3. Header manipulation

  4. SQL injection

Answer: B

Question No: 42 – (Topic 1)

Use of group accounts should be minimized to ensure which of the following?

  1. Password security

  2. Regular auditing

  3. Baseline management

  4. Individual accountability

Answer: D

Question No: 43 – (Topic 1)

Privilege creep among long-term employees can be mitigated by which of the following procedures?

  1. User permission reviews

  2. Mandatory vacations

  3. Separation of duties

  4. Job function rotation

Answer: A

Question No: 44 – (Topic 1)

In which of the following scenarios is PKI LEAST hardened?

  1. The CRL is posted to a publicly accessible location.

  2. The recorded time offsets are developed with symmetric keys.

  3. A malicious CA certificate is loaded on all the clients.

  4. All public keys are accessed by an unauthorized user.

Answer: C

Question No: 45 – (Topic 1)

Configuring the mode, encryption methods, and security associations are part of which of the following?

  1. IPSec

  2. Full disk encryption

C. 802.1x

D. PKI

Answer: A

Question No: 46 – (Topic 1)

Which of the following assessments would Pete, the security administrator, use to actively test that an application’s security controls are in place?

  1. Code review

  2. Penetration test

  3. Protocol analyzer

  4. Vulnerability scan

Answer: B

Question No: 47 – (Topic 1)

A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?

  1. Confidentiality

  2. Availability

  3. Succession planning

  4. Integrity

Answer: B

Question No: 48 – (Topic 1)

In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager. Which of the following incident response procedures would he need to perform in order to begin the analysis? (Select TWO).

  1. Take hashes

  2. Begin the chain of custody paperwork

  3. Take screen shots

  4. Capture the system image

  5. Decompile suspicious files

Answer: A,D

Question No: 49 – (Topic 1)

Which of the following is used to certify intermediate authorities in a large PKI deployment?

  1. Root CA

  2. Recovery agent

  3. Root user

  4. Key escrow

Answer: A

Question No: 50 – (Topic 1)

Which of the following components MUST be trusted by all parties in PKI?

  1. Key escrow

  2. CA

  3. Private key

  4. Recovery key

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
Download 2018 Dumps4cert JK0-018 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Comments are closed.