Ensurepass

 

QUESTION 741

Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives?

 

A.

Degaussing

B.

Physical Destruction

C.

Lock up hard drives in a secure safe

D.

Wipe

 

Correct Answer: B

 

 

QUESTION 742

A company has recently implemented a high density wireless system by having a junior technician install two new access points for every access point already deployed. Users are now reporting random wireless disconnections and slow network connectivity. Which of the following is the MOST likely cause?

 

A.

The old APs use 802.11a

B.

Users did not enter the MAC of the new APs

C.

The new APs use MIMO

D.

A site survey was not conducted

 

Correct Answer: D

 

 

QUESTION 743

A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access
the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue?

 

A.

The SSID broadcast is disabled.

B.

The company is using the wrong antenna type.

C.

The MAC filtering is disabled on the access point.

D.

The company is not using strong enough encryption.

 

Correct Answer: A

 

 

QUESTION 744

A company is looking to reduce the likelihood of employees in the finance department being involved with money laundering. Which of the following controls would BEST mitigate this risk?

 

A.

Implement privacy policies

B.

Enforce mandatory vacations

C.

Implement a security policy

D.

Enforce time of day restrictions

 

Correct Answer: B

 

 

QUESTION 745

A company recently experienced data loss when a server crashed due to a midday power outage. Which of the following should be used to prevent this from occurring again?

 

A.

Recovery procedures

B.

EMI shielding

C.

Environmental monitoring

D.

Redundancy

 

Correct Answer: D

 

 

QUESTION 746

Joe, a security administrator, is concerned with users tailgating into the restricted areas. Given a limited budget, which of the following would BEST assist Joe with detecting this activity?

 

A.

Place a full-time guard at the entrance to confirm user identity.

B.

Install a camera and DVR at the entrance to monitor access.

C.

Revoke all proximity badge access to make users justify access.

D.

Install a motion detector near the entrance.

 

Correct Answer: B

 

 

QUESTION 747

It is important to staff who use email messaging to provide PII to others on a regular basis to have confidence that their messages are not intercepted or altered during transmission. They are concerned about which of the following types of security control?

 

A.

Integrity

B.

Safety

C.

Availability

D.

Confidentiality

 

Correct Answer: A

 

 

QUESTION 748

A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security controls?

 

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Safety

 

Correct Answer: D

 

 

 

 

 

 

QUESTION 749

A security engineer is reviewing log data and sees the output below:

 

POST: /payload.php HTTP/1.1

 

HOST: localhost

 

Accept: */*

 

< font face="Arial">Referrer: http://localhost/

 

*******

 

HTTP/1.1 403 Forbidden

 

Connection: close

 

Log: Access denied with 403. Pattern matches form bypass

 

Which of the following technologies was MOST likely being used to generate this log?

 

A.

Host-based Intrusion Detection System

B.

Web application firewall

C.

Network-based Intrusion Detection System

D.

Stateful Inspection Firewall

E.

URL Content Filter

 

Correct Answer: B

 

 

QUESTION 750

A security team has identified that the wireless signal is broadcasting into the parking lot. To reduce the risk of an attack against the wireless network from the parking lot, which of the following controls should be used? (Select TWO).

 

A.

Antenna placement

B.

Interference

C.

Use WEP

D.

Single Sign on

E.

Disable the SSID

F.

Power levels

 

Correct Answer: AF

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.