Ensurepass

 

QUESTION 221

A CRL is comprised of.

 

A.

Malicious IP addresses.

B.

Trusted CA’s.

C.

Untrusted private keys.

D.

Public keys.

 

Correct Answer: D

 

 

 

 

QUESTION 222

Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

 

A.

Logic bomb

B.

Worm

C.

Trojan

D.

Adware

 

Correct Answer: C

 

 

QUESTION 223

Which of the following may significantly reduce data loss if multiple drives fail at the same time?

 

A.

Virtualization

B.

RAID

C.

Load balancing

D.

Server clustering

 

Correct Answer: B

 

 

QUESTION 224

Which of the following should be considered to mitigate data theft when using CAT5 wiring?

 

A.

CCTV

B.

Environmental monitoring

C.

Multimode fiber

D.

EMI shielding

 

Correct Answer: D

 

 

QUESTION 225

To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?

 

A.

Management

B.

Administrative

C.

Technical

D.

Operational

 

Correct Answer: C

 

 

 

 

 

 

 

QUESTION 226

Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?

 

A.

Connect the WAP to a different switch.

B.

Create a voice VLAN.

C.

Create a DMZ.

D.

Set the switch ports to 802.1q mode.

 

Correct Answer: B

 

 

QUESTION 227

Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).

 

A.

10.4.4.125

B.

10.4.4.158

C.

10.4.4.165

D.

10.4.4.189

E.

10.4.4.199

 

Correct Answer: CD

 

 

QUESTION 228

Which of the following algorithms has well documented collisions? (Select TWO).

 

A.

AES

B.

MD5

C.

SHA

D.

SHA-256

E.

RSA

 

Correct Answer: BC

 

 

QUESTION 229

Which of the following is BEST used as a secure replacement for TELNET?

 

A.

HTTPS

B.

HMAC

C.

GPG

D.

SSH

 

Correct Answer: D

 

 

 

 

 

 

QUESTION 230

An email client says a digital signature is invalid and the sender cannot be verified. The recipient is concerned with which of the foll
owing concepts?

 

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Remediation

 

Correct Answer: A

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.