Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!

CompTIA Security E2C

Question No: 51 – (Topic 1)

Which of the following should Matt, a security administrator, include when encrypting smartphones? (Select TWO).

  1. Steganography images

  2. Internal memory

  3. Master boot records

  4. Removable memory cards

  5. Public keys

Answer: B,D

Question No: 52 – (Topic 1)

Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT

  1. Buffer overflow prevention

  2. Input validation

  3. CSRF prevention

  4. Cross-site scripting prevention

Answer: B

Question No: 53 – (Topic 1)

A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?

  1. RADIUS

  2. TACACS

  3. Kerberos

  4. LDAP

Answer: B

Question No: 54 – (Topic 1)

Which of the following can use RC4 for encryption? (Select TWO).

  1. CHAP

  2. SSL

  3. WEP

  4. AES

  5. 3DES

Answer: B,C

Question No: 55 – (Topic 1)

Which of the following defines a business goal for system restoration and acceptable data loss?

  1. MTTR

  2. MTBF

  3. RPO

  4. Warm site

Answer: C

Question No: 56 – (Topic 1)

If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing?

  1. Transitive trust

  2. Public key trust

  3. Certificate authority trust

  4. Domain level trust

Answer: A

Question No: 57 – (Topic 1)

Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?

  1. Business continuity planning

  2. Continuity of operations

  3. Business impact analysis

  4. Succession planning

Answer: D

Question No: 58 – (Topic 1)

Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?

  1. Recovery agent

  2. Certificate authority

  3. Trust model

  4. Key escrow

Answer: A

Question No: 59 – (Topic 1)

Which of the following devices will help prevent a laptop from being removed from a certain location?

  1. Device encryption

  2. Cable locks

  3. GPS tracking

  4. Remote data wipes

Answer: B

Question No: 60 – (Topic 1)

Which of the following is the MOST secure protocol to transfer files?

  1. FTP

  2. FTPS

  3. SSH

  4. TELNET

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Dumps4cert Pass Guaranteed!
Download 2018 Dumps4cert JK0-018 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Comments are closed.