Ensurepass

 

QUESTION 361

Certificates are used for: (Select TWO).

 

A.

Client authentication.

B.

WEP encryption.

C.

Access control lists.

D.

Code signing.

E.

Password hashing.

 

Correct Answer: AD< /font>

 

 

QUESTION 362

Which of the following is a hardware based encryption device?

 

A.

EFS

B.

TrueCrypt

C.

TPM

D.

SLE

 

Correct Answer: C

 

 

QUESTION 363

When Ann an employee returns to work and logs into her workstation she notices that, several desktop configuration settings have changed. Upon a review of the CCTV logs, it is determined that someone logged into Ann’s workstation. Which of the following could have prevented this from happening?

 

A.

Password complexity policy

B.

User access reviews

C.

Shared account prohibition policy

D.

User assigned permissions policy

 

Correct Answer: A

 

 

QUESTION 364

A security administrator discovered that all communication over the company’s encrypted wireless network is being captured b
y savvy employees with a wireless sniffing tool and is then being decrypted in an attempt to steal other employee’s credentials. Which of the following technology is MOST likely in use on the company’s wireless?

 

A.

WPA with TKIP

B.

VPN over open wireless

C.

WEP128-PSK

D.

WPA2-Enterprise

 

Correct Answer: A

 

 

QUESTION 365

An administrator is building a development environment and requests that three virtual servers are cloned and placed in a new virtual network isolated from the production network. Which of the following describes the environment the administer is building?

 

A.

Cloud

B.

Trusted

C.

Sandbox

D.

Snapshot

 

Correct Answer: C

 

 

QUESTION 366

The chief Risk officer is concerned about the new employee BYOD device policy and has requested the security department implement mobile security controls to protect corporate data in the event that a device is lost or stolen. The level of protection must not be compromised even if the communication SIM is removed from the device. Which of the following BEST meets the requirements? (Select TWO)

 

A.

Asset tracking

B.

Screen-locks

C.

GEO-Tracking

D.

Device encryption

 

Correct Answer: AD

 

 

QUESTION 367

An administrator needs to connect a router in one building to a router in another using Ethernet. Each router is connected to a managed switch and the switches are connected to each other via a fiber line. Which of the following should be configured to prevent unauthorized devices from connecting to the network?

 

A.

Configure each port on the switches to use the same VLAN other than the default one

B.

Enable VTP on both switches and set to the same domain

C.

Configure only one if the routers to run DHCP services

D.

Implement port security on the switches

 

Correct Answer: D

 

 

QUESTION 368

The datacenter design team is implementing a system, which requires all servers installed in racks to face in a predetermined direction. AN infrared camera will be used to verify that servers are properly racked. Which of the following datacenter elements is being designed?

 

A.

Hot and cold aisles

B.

Humidity control

C.

HVAC system

D.

EMI shielding

 

Correct Answer: A

 

 

QUESTION 369

Computer evidence at a crime is preserved by making an exact copy of the hard disk. Which of the following does this illustrate?

 

A.

Taking screenshots

B.

System image capture

C.

Chain of custody

D.

Order of volatility

 

Correct Answer: B

 

 

QUESTION 370

Joe, an employee is taking a taxi through a busy city and starts to receive unsolicited files sent to his Smartphone. Which of the following is this an example of?

 

A.

Vishing

B.

Bluejacking

C.

War Driving

D.

SPIM

E.

Bluesnarfing

 

Correct Answer: B

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.