Ensurepass

 

 

QUESTION 41

A bank has a fleet of aging payment terminals used by merchants for transactional processing. The terminals currently support single DES but require an upgrade in order to be compliant with security standards. Which of the following is likely to be the simplest upgrade to the aging terminals which will improve in-transit protection of transactional data?

 

A.

AES

B.

3DES

C.

RC4

D.

WPA2

 

Correct Answer: B

 

 

QUESTION 42

Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?

 

A.

WAF

B.

NIDS

C.

Routers

D.

Switches

 

Correct Answer: A

QUESTION 43

Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?

 

A.

Protocol analyzer

B.

Router

C.

Firewall

D.

HIPS

 

Correct Answer: A

 

 

QUESTION 44

After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation?

 

A.< /font>

Information Security Awareness

B.

Social Media and BYOD

C.

Data Handling and Disposal

D.

Acceptable Use of IT Systems

 

Correct Answer: A

 

 

QUESTION 45

Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

 

A.

Hashing

B.

Stream ciphers

C.

Steganography

D.

Block ciphers

 

Correct Answer: A

 

 

QUESTION 46

Which of the following encrypts data a single bit at a time?

 

A.

Stream cipher

B.

Steganography

C.

3DES

D.

Hashing

 

Correct Answer: A

 

 

QUESTION 47

Which of the following is used to verify data integrity?

 

A.

SHA

B.

3DES

C.

AES

D.

RSA

 

Correct Answer: A

 

 

QUESTION 48

By default, which of the following uses TCP port 22? (Select THREE).

 

A.

FTPS

B.

STELNET

C.

TLS

D.

SCP

E.

SSL

F.

HTTPS

G.

SSH

H.

SFTP

 

Correct Answer: DGH

 

 

QUESTION 49

Access mechanisms to data on encrypted USB hard drives must be implemented correctly otherwise:

 

A.

user accounts may be inadvertently locked out.

B.

data on the USB drive could be corrupted.

C.

data on the hard drive will be vulnerable to log analysis.

D.

the security controls on the USB drive can be bypassed.

 

Correct Answer: D

 

 

QUESTION 50

Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO’s office with various connected cables from the office. Which of the following describes the type of attack that was occurring?

 

A.

Spear phishing

B.

Packet sniffing

C.

Impersonation

D.

MAC flooding

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.