Ensurepass

 

QUESTION 751

An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to integrate the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?

 

A.

Unified Threat Management

B.

Virtual Private Network

C.

Single sign on

D.

Role-based management

Correct Answer: A

 

 

QUESTION 752

A company’s legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO).

 

A.

IPv6

B.

SFTP

C.

IPSec

D.

SSH

E.

IPv4

 

Correct Answer: AC

 

 

QUESTION 753

Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario?

 

A.

Application Firewall

B.

Anomaly Based IDS

C.

Proxy Firewall

D.

Signature IDS

 

Correct Answer: B

 

 

QUESTION 754

Which of the following describes the purpose of an MOU?

 

A.

Define interoperability requirements

B.

Define data backup process

C.

Define onboard/offboard procedure

D.

Define responsibilities of each party

 

Correct Answer: D

 

 

QUESTION 755

The security manager received a report that an employee was involved in illegal activity and has saved data to a workstation’s hard drive. During the investigation, local law enforcement’s criminal division confiscates the hard drive as evidence. Which of the following forensic procedures is involved?

 

A.

Chain of custody

B.

System image

C.

Take hashes

D.

Order of volatility

 

Correct Answer: A

 

 

QUESTION 756

Environmental control measures include which of the following?

 

A.

Access list

B.

Lighting

C.

Motion detection

D.

EMI shielding

 

Correct Answer: D

 

 

QUESTION 757

Which of the following is the BEST concept to maintain required but non-critical server availability?

 

A.

SaaS site

B.

Cold site

C.

Hot site

D.

Warm site

 

Correct Answer: D

 

 

QUESTION 758

Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture on a popular social media site together with the message: “Heading to our two weeks vacation to Italy.” Upon returning home, Joe discovers that the house was burglarized. Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe’s home address?

 

A.

Joe has enabled the device access control feature on his mobile phone.

B.

Joe’s home address can be easily found using the TRACEROUTE command.

C.

The picture uploaded to the social media site was geo-tagged by the mobile phone.

D.

The message posted on the social media site informs everyone the house will be empty.

 

Correct Answer: C

 

 

QUESTION 759

Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network?

 

A.

Application white listing

B.

Remote wiping

C.

Acceptable use policy

D.

Mobile device management

 

Correct Answer: D

 

 

QUESTION 760

Which of the following would prevent a user from installing a program on a company-owned mobile device?

 

A.

White-listing

B.

Access control lists

C.

Geotagging

D.

Remote wipe

 

Correct Answer: A

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.