[Free] 2017(Nov) Dumps4cert Testinsides CompTIA JK0-018 Dumps with VCE and PDF Download 331-340

Dumps4cert 2017 Nov CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/JK0-018.html

CompTIA Security E2C

Question No: 331 – (Topic 4)

The helpdesk reports increased calls from clients reporting spikes in malware infections on their systems. Which of the following phases of incident response is MOST appropriate as a FIRST response?

  1. Recovery

  2. Follow-up

  3. Validation

  4. Identification

  5. Eradication

  6. Containment

Answer: D

Question No: 332 – (Topic 4)

Which of the following protocols would be used to verify connectivity between two remote devices at the HIGHEST level of the OSI model?

  1. ICMP

  2. IPSec

  3. SCP

  4. TCP

Answer: C

Question No: 333 – (Topic 4)

Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?

  1. Protocol analyzer

  2. Load balancer

  3. VPN concentrator

  4. Web security gateway

Answer: B

Question No: 334 – (Topic 4)

Which of the following uses port 22 by default? (Select THREE).

  1. SSH

  2. SSL

  3. TLS

  4. SFTP

  5. SCP

  6. FTPS

  7. SMTP

  8. SNMP

Answer: A,D,E

Question No: 335 – (Topic 4)

Ann, a software developer, has installed some code to reactivate her account one week after her account has been disabled. Which of the following is this an example of? (Select TWO).

  1. Rootkit

  2. Logic Bomb

  3. Botnet

  4. Backdoor

  5. Spyware

Answer: B,D

Question No: 336 – (Topic 4)

The string: ‘ or 1=1- –

represents which of the following?

  1. Bluejacking

  2. Rogue access point

  3. SQL Injection

  4. Client-side attacks

Answer: C

Question No: 337 – (Topic 4)

Joe, an administrator, installs a web server on the Internet that performs credit card transactions for customer payments. Joe also sets up a second web server that looks like the first web server. However, the second server contains fabricated files and folders made to look like payments were processed on this server but really were not. Which of the following is the second server?

  1. DMZ

  2. Honeynet

  3. VLAN

  4. Honeypot

Answer: D

Question No: 338 – (Topic 4)

Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?

  1. Security logs

  2. Protocol analyzer

  3. Audit logs

  4. Honeypot

Answer: D

Question No: 339 – (Topic 4)

Which of the following should Joe, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from his company?

  1. Privacy Policy

  2. Least Privilege

  3. Acceptable Use

  4. Mandatory Vacations

Answer: D

Question No: 340 – (Topic 4)

Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for multicast packets from the switches on the network. After investigation, she discovers that this is normal activity for her network. Which of the following BEST describes these results?

  1. True negatives

  2. True positives

  3. False positives

  4. False negatives

Answer: C

100% Free Download!
Download Free Demo:JK0-018 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert JK0-018 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *