Ensurepass

 

 

QUESTION 101

An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?

 

A.

Unified Threat Management

B.

Virtual Private Network

C.

Single sign on

D.

Role-based management

 

Correct Answer: A

 

< font face="Arial"> 

QUESTION 102

Which of the following would allow the organization to divide a Class C IP address range into several ranges?

 

A.

DMZ

B.

Virtual LANs

C.

NAT

D.

Subnetting

 

Correct Answer: D

 

 

QUESTION 103

The security administrator is currently unaware of an incident that oc
curred a week ago. Which of the following will ensure the administrator is notified in a timely manner in the future?

 

A.

User permissions reviews

B.

Incident response team

C.

Change management

D.

Routine auditing

 

Correct Answer: D

 

 

 

QUESTION 104

An access point has been configured for AES encryption but a client is unable to connect to it. Which of the following should be configured on the client to fix this issue?

 

A.

WEP

B.

CCMP

C.

TKIP

D.

RC4

 

Correct Answer: B

 

 

QUESTION 105

The system administrator is tasked with changing the administrator password across all 2000 computers in the organization. Which of the following should the system administrator implement to accomplish this task?

 

A.

A security group

B.

A group policy

C.

Key escrow

D.

Certificate revocation

 

Correct Answer: B

 

 

QUESTION 106

A network administrator wants to block both DNS requests and zone transfers coming from outside IP addresses. The company uses a firewall which implements an implicit allow and is currently configured with the following ACL applied to its external interface.

 

PERMIT TCP ANY ANY 80

PERMIT TCP ANY ANY 443

 

Which of the following rules would accomplish this task? (Select TWO).

 

A.

Change the firewall default settings so that it implements an implicit deny

B.

Apply the current ACL to all interfaces of the firewall

C.

Remove the current ACL

D.

Add the following ACL at the top of the current ACL

DENY TCP ANY ANY 53

E.

Add the following ACL at the bottom of the current ACL

DENY ICMP ANY ANY 53

F.

Add the following ACL at the bottom of the current ACL

DENY IP ANY ANY 53

 

Correct Answer: AF

 

 

QUESTION 107

Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway?

 

A.

Wireless jamming

B.

Evil twin

C.

Rogue AP

D.

Packet sniffing

 

Correct Answer: A

 

 

QUESTION 108

An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized while the computer is in use. Which of the following can be implemented?

 

A.

Cluster tip wiping

B.

Individual file encryption

C.

Full disk encryption

D.

Storage retention

 

Correct Answer: A

 

 

QUESTION 109

A company is looking to improve their security posture by addressing risks uncovered by a recent penetration test. Which of the following risks is MOST likely to affect the business on a day-to-day basis?

 

A.

Insufficient encryption methods

B.

Large scale natural disasters

C.

Corporate espionage

D.

Lack of antivirus software

 

Correct Answer: D

 

 

QUESTION 110

Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer information in a recycle bin without shredding it first. This is MOST likely to increase the risk of loss from which of the following attacks?

 

A.

Shoulder surfing

B.

Dumpster diving

C.

Tailgating

D.

Spoofing

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.