Ensurepass

 

QUESTION 291

Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?

 

A.

Restoration and recovery strategies

B.

Deterrent strategies

C.

Containment strategies

D.

Detection strategies

 

Correct Answer: C

 

 

QUESTION 292

In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using?

 

A.

Three factor

B.

Single factor

C.

Two factor

D.

Four factor

 

Correct Answer: B

 

 

QUESTION 293

Using proximity card readers instead of the traditional key punch doors would help to mitigate:

 

A.

Impersonation

B.

Tailgating

C.

Dumpster diving

D.

Shoulder surfing

 

Correct Answer: D

 

 

QUESTION 294

Which of the following application attacks is used to gain access to SEH?

 

A.

Cookie stealing

B.

Buffer overflow

C.

Directory traversal

D.

XML injection

Correct Answer: B

 

 

QUESTION 295

Which of the following is an authentication service that uses UDP as a transport medium?

 

A.

TACACS+

B.

LDAP

C.

Kerberos

D.

RADIUS

 

Correct Answer: D

 

 

QUESTION 296

Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).

 

A.

Tethering

B.

Screen lock PIN

C.

Remote wipe

D.

Email password

E.

GPS tracking

F.

Device encryption

 

Correct Answer: CF

 

 

QUESTION 297

Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company?

 

A.

< p class="MsoNormal" style="margin: 0cm 0cm 0pt; line-height: normal; text-autospace: ; mso-layout-grid-align: none" align="left">Vulnerability scanner

B.

Honeynet

C.

Protocol analyzer

D.

Port scanner

 

Correct Answer: B

 

 

QUESTION 298

Which of the following should Pete, a security manager, implement to reduce the risk of

 

employees working in collusion to embezzle funds from their company?

 

A.

Privacy Policy

B.

Least Privilege

C.

Acceptable Use

D.

Mandatory Vacations

 

Correct Answer: D

 

 

QUESTION 299

Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?

 

A.

Network based firewall

B.

Anti-spam software

C.

Host based firewall

D.

Anti-spyware software

 

Correct Answer: D

 

 

QUESTION 300

Which of the following protocols allows for secure transfer of files? (Select TWO).

 

A.

ICMP

B.

SNMP

C.

SFTP

D.

SCP

E.

TFTP

 

Correct Answer: CD

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.