[Free] 2017(Nov) Dumps4cert Testinsides CompTIA JK0-018 Dumps with VCE and PDF Download 251-260

Dumps4cert 2017 Nov CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/JK0-018.html

CompTIA Security E2C

Question No: 251 – (Topic 3)

A hacker has discovered a simple way to disrupt business for the day in a small company which relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely working staff access to company systems with a script. Which of the following security controls is the hacker exploiting?

  1. DoS

  2. Account lockout

  3. Password recovery

  4. Password complexity

Answer: B

Question No: 252 – (Topic 3)

A security specialist has been asked to evaluate a corporate network by performing a vulnerability assessment. Which of the following will MOST likely be performed?

  1. Identify vulnerabilities, check applicability of vulnerabilities by passively testing security controls.

  2. Verify vulnerabilities exist, bypass security controls and exploit the vulnerabilities.

  3. Exploit security controls to determine vulnerabilities and mis-configurations.

  4. Bypass security controls and identify applicability of vulnerabilities by passively testing security controls.

Answer: A

Question No: 253 – (Topic 3)

A security technician is attempting to access a wireless network protected with WEP. The technician does not know any information about the network. Which of the following should the technician do to gather information about the configuration of the wireless network?

  1. Spoof the MAC address of an observed wireless network client

  2. Ping the access point to discover the SSID of the network

  3. Perform a dictionary attack on the access point to enumerate the WEP key

  4. Capture client to access point disassociation packets to replay on the local PC#39;s loopback

Answer: A

Question No: 254 – (Topic 3)

After an assessment, auditors recommended that an application hosting company should contract with additional data providers for redundant high speed Internet connections.

Which of the following is MOST likely the reason for this recommendation? (Select TWO).

  1. To allow load balancing for cloud support

  2. To allow for business continuity if one provider goes out of business

  3. To eliminate a single point of failure

  4. To allow for a hot site in case of disaster

  5. To improve intranet communication speeds

Answer: B,C

Question No: 255 – (Topic 3)

A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks. Which of the following is MOST likely the reason for the sub-interfaces?

  1. The network uses the subnet of 255.255.255.128.

  2. The switch has several VLANs configured on it.

  3. The sub-interfaces are configured for VoIP traffic.

  4. The sub-interfaces each implement quality of service.

Answer: B

Question No: 256 – (Topic 3)

Which of the following should be enabled in a laptop’s BIOS prior to full disk encryption?

  1. USB

  2. HSM

  3. RAID

  4. TPM

Answer: D

Question No: 257 – (Topic 3)

Company employees are required to have workstation client certificates to access a bank website. These certificates were backed up as a precautionary step before the new computer upgrade. After the upgrade and restoration, users state they can access the bank’s website, but not login. Which is the following is MOST likely the issue?

  1. The IP addresses of the clients have change

  2. The client certificate passwords have expired on the server

  3. The certificates have not been installed on the workstations

  4. The certificates have been installed on the CA

Answer: C

Question No: 258 – (Topic 3)

Digital Signatures provide which of the following?

  1. Confidentiality

  2. Authorization

  3. Integrity

  4. Authentication

  5. Availability

Answer: C

Question No: 259 – (Topic 3)

A user ID and password together provide which of the following?

  1. Authorization

  2. Auditing

  3. Authentication

  4. Identification

Answer: C

Question No: 260 – (Topic 3)

RADIUS provides which of the following?

  1. Authentication, Authorization, Availability

  2. Authentication, Authorization, Auditing

  3. Authentication, Accounting, Auditing

  4. Authentication, Authorization, Accounting

Answer: D

100% Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert JK0-018 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *