Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
JK0-018 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Braindumps CompTIA JK0-018 Dumps with VCE and PDF 371-380

September 18, 2017

EnsurePass
2017 Sep CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/JK0-018.html

CompTIA Security E2C

Question No: 371 – (Topic 4)

Which of the following results in datacenters with failed humidity controls? (Select TWO).

  1. Excessive EMI

  2. Electrostatic charge

  3. Improper ventilation

  4. Condensation

  5. Irregular temperature

Answer: B,D

Question No: 372 – (Topic 4)

An online store wants to protect user credentials and credit card information so that customers can store their credit card information and use their card for multiple separate transactions. Which of the following database designs provides the BEST security for the online store?

  1. Use encryption for the credential fields and hash the credit card field

  2. Encrypt the username and hash the password

  3. Hash the credential fields and use encryption for the credit card field

  4. Hash both the credential fields and the credit card field

Answer: C

Question No: 373 – (Topic 4)

A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales department?

  1. Time of day restrictions

  2. Group based privileges

  3. User assigned privileges

  4. Domain admin restrictions

Answer: B

Question No: 374 – (Topic 4)

A security administrator is reviewing the below output from a password auditing tool:

P@ss.

@pW1. S3cU4

Which of the following additional policies should be implemented based on the tool’s output?

  1. Password age

  2. Password history

  3. Password length

  4. Password complexity

Answer: C

Question No: 375 – (Topic 4)

Joe, a user, in a coffee shop is checking his email over a wireless network. An attacker records the temporary credentials being passed to Joe’s browser. The attacker later uses the credentials to impersonate Joe and creates SPAM messages. Which of the following attacks allows for this impersonation?

  1. XML injection

  2. Directory traversal

  3. Header manipulation

  4. Session hijacking

Answer: D

Question No: 376 – (Topic 4)

A security architect wishes to implement a wireless network with connectivity to the company’s internal network. Before they inform all employees that this network is being put in place, the architect wants to roll it out to a small test segment. Which of the following allows for greater secrecy about this network during this initial phase of implementation?

  1. Disabling SSID broadcasting

  2. Implementing WPA2 – TKIP

  3. Implementing WPA2 – CCMP

  4. Filtering test workstations by MAC address

Answer: A

Question No: 377 – (Topic 4)

Digital certificates can be used to ensure which of the following? (Select TWO).

  1. Availability

  2. Confidentiality

  3. Verification

  4. Authorization

  5. Non-repudiation

Answer: C,E

Question No: 378 – (Topic 4)

A network administrator is looking for a way to automatically update company browsers so they import a list of root certificates from an online source. This online source will then be responsible for tracking which certificates are to be trusted or not trusted. Which of the following BEST describes the service that should be implemented to meet these requirements?

  1. Trust model

  2. Key escrow

  3. OCSP

  4. PKI

Answer: A

Question No: 379 – (Topic 4)

A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on which of the following?

  1. Peer to Peer

  2. Mobile devices

  3. Social networking

  4. Personally owned devices

Answer: C

Question No: 380 – (Topic 4)

A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates. Which of the following processes could MOST effectively mitigate these risks?

  1. Application hardening

  2. Application change management

  3. Application patch management

  4. Application firewall review

Answer: C

100% Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass JK0-018 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE