[Free] 2018(Aug) Dumps4cert CompTIA JK0-018 Dumps with VCE and PDF Download 321-330
Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released JK0-018
100% Free Download! 100% Pass Guaranteed!
CompTIA Security E2C
Question No: 321 – (Topic 4)
Which of the following will help prevent smurf attacks?
-
Allowing necessary UDP packets in and out of the network
-
Disabling directed broadcast on border routers
-
Disabling unused services on the gateway firewall
-
Flash the BIOS with the latest firmware
Answer: B
Question No: 322 – (Topic 4)
An advantage of virtualizing servers, databases, and office applications is:
-
Centralized management.
-
Providing greater resources to users.
-
Stronger access control.
-
Decentralized management.
Answer: A
Question No: 323 – (Topic 4)
A major security risk with co-mingling of hosts with different security requirements is:
-
Security policy violations.
-
Zombie attacks.
-
Password compromises.
-
Privilege creep.
Answer: A
Question No: 324 – (Topic 4)
Which of the following attacks targets high level executives to gain company information?
-
Phishing
-
Whaling
-
Vishing
-
Spoofing
Answer: B
Question No: 325 – (Topic 4)
Which of the following can be used as an equipment theft deterrent?
-
Screen locks
-
GPS tracking
-
Cable locks
-
Whole disk encryption
Answer: C
Question No: 326 – (Topic 4)
At the outside break area, an employee, Ann, asked another employee to let her into the building because her badge is missing. Which of the following does this describe?
-
Shoulder surfing
-
Tailgating
-
Whaling
-
Impersonation
Answer: B
Question No: 327 – (Topic 4)
A company that has a mandatory vacation policy has implemented which of the following controls?
-
Risk control
-
Privacy control
-
Technical control
-
Physical control
Answer: A
Question No: 328 – (Topic 4)
Ann, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Ann should immediately implement which of the following?
-
Acceptable Use Policy
-
Physical security controls
-
Technical controls
-
Security awareness training
Answer: D
Question No: 329 – (Topic 4)
Which of the following is the MOST intrusive type of testing against a production system?
-
White box testing
-
War dialing
-
Vulnerability testing
-
Penetration testing
Answer: D
Question No: 330 – (Topic 4)
The IT department has installed new wireless access points but discovers that the signal extends far into the parking lot. Which of the following actions should be taken to correct this?
-
Disable the SSID broadcasting
-
Configure the access points so that MAC filtering is not used
-
Implement WEP encryption on the access points
-
Lower the power for office coverage only
Answer: D
100% Dumps4cert Free Download!
–JK0-018 PDF
100% Dumps4cert Pass Guaranteed!
–JK0-018 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |