Ensurepass

 

QUESTION 541

How often, at a MINIMUM, should Sara, an administrator, review the accesses and right of the users on her system?

 

A.

Annually

B.

Immediately after an employee is terminated

C.

Every five years

D.

Every time they patch the server

 

Correct Answer: A

 

 

QUESTION 542

An administrator is concerned that a company’s web server has not been patched. Which of the following would be the BEST assessment for the administrator to perform?

 

A.

Vulnerability scan

B.

Risk assessment

C.

Virus scan

D.

Network sniffer

 

Correct Answer: A

 

 

QUESTION 543

An administrator notices that former temporary employees’ accounts are still active on a domain.

Which of the following can be impl
emented to increase security and prevent this from happening?

 

A.

Implement a password expiration policy.

B.

Implement an account expiration date for permanent employees.

C.

Implement time of day restrictions for all temporary employees.

D.

Run a last logon script to look for inactive accounts.

 

Correct Answer: D

 

 

 

 

 

 

QUESTION 544

A trojan was recently discovered on a server. There are now concerns that there has been a security breach that allows unauthorized people to access data. The administrator should be looking for the presence of a/an:

 

A.

Logic bomb.

B.

Backdoor.

C.

Adware application.

D.

Rootkit.

 

Correct Answer: B

 

 

QUESTION 545

Which of the following prot
ocols uses TCP instead of UDP and is incompatible with all previous versions?

 

A.

TACACS

B.

XTACACS

C.

RADIUS

D.

TACACS+

 

Correct Answer: D

 

 

QUESTION 546

Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE).

 

A.

RC4

B.

3DES

C.

AES

D.

MD5

E.

PGP

F.

Blowfish

 

Correct Answer: BCF

 

 

QUESTION 547

Which of the following must be kept secret for a public key infrastructure to remain secure?

 

A.

Certificate Authority

B.

Certificate revocation list

C.

Public key ring

D.

Private key

 

Correct Answer: D

 

 

 

 

 

 

QUESTION 548

Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?

 

A.

Protocol filter

B.

Load balancer

C.

NIDS

D.

Layer 7 firewall

 

Correct Answer: D

 

 

QUESTION 549

Which of the following is best practice to put at the end of an ACL?

 

A.

Implicit deny

B.

Time of day restrictions

C.

Implicit allow

D.

SNMP string

 

Correct Answer: A

 

 

QUESTION 550

Which of the following security concepts can prevent a user from logging on from home during the weekends?

 

A.

Time of day restrictions

B.

Multifactor authentication

C.

Implicit deny

D.

Common access card

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.