Ensurepass

 

QUESTION 61

A recent audit has discovered that at the time of password expiration clients are able to recycle the previous credentials for authentication. Which of the following controls should be used together to prevent this from occurring? (Select TWO).

 

A.

Password age

B.

Password hashing

C.

Password complexity

D.

Password history

E.

Password length

 

Correct Answer: AD

 

 

QUESTION 62

A system administrator is configuring UNIX accounts to authenticate against an external server. The configuration file asks for the following information DC=ServerName and DC=COM. Which of the following authentication services is being used?

 

A.

RADIUS

B.

SAML

C.

TACACS+

D.

LDAP

 

Correct Answer: D

 

 

QUESTION 63

In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following?

 

A.

Identification

B.

Authorization

C.

Authentication

D.

Multifactor authentication

 

Correct Answer: C

 

QUESTION 64

Which of the following network design elements allows for many internal devices to share one public IP address?

 

A.

DNAT

B.

PAT

C.

DNS

D.

DMZ

 

Correct Answer: B

 

 

QUESTION 65

Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?

 

A.

Spam filter

B.

URL filter

C.

Content inspection

D.

Malware inspection

 

Correct Answer: B

 

 

QUESTION 66

When considering a vendor-specific vulnerability in critical industrial control systems which of the following techniques supports availability?

 

A.

Deploying identical application firew
alls at the border

B.

Incorporating diversity into redundant design

C.

Enforcing application white lists on the support workstations

D.

Ensuring the systems’ anti-virus definitions are up-to-date

 

Correct Answer: B

 

 

QUESTION 67

During the information gathering stage of a deploying role-based access control model, which of the following information is MOST likely required?

 

A.

Conditional rules under which certain systems may be accessed

B.

Matrix of job titles with required access privileges

C.

Clearance levels of all company personnel

D.

Normal hours of business operation

 

Correct Answer: B

 

 

 

 

 

 

 

QUESTION 68

The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future?

 

A.

Job rotation

B.

Separation of duties

C.

Mandatory Vacations

D.

Least Privilege

 

Correct Answer: B

 

 

QUESTION 69

Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information. Which of the following will accomplish this task securely?

 

A.

Digital Signatures

B.

Hashing

C.

Secret Key

D.

Encryption

 

Correct Answer: D

 

 

QUESTION 70

A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents. Which of the following would be the BEST technology control to use in this scenario?

 

A.

Content filtering

B.

IDS

C.

Audit logs

D.

DLP

 

Correct Answer: D

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.