Ensurepass

 

 

QUESTION 601

Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privilege principles?

 

A.

User rights reviews

B.

Incident management

C.

Risk based controls

D.

Annual loss expectancy

 

Correct Answer: A

 

 

QUESTION 602

The security officer is preparing a read-only USB stick with a document of important personal phone numbers, vendor contacts, an MD5 program, and other tools to provide to employees. At which of the following points in an incident should the officer instruct employees to use this information?

 

A.

Business Impact Analysis

B.

First Responder

C.

Damage and Loss Control

D.

Contingency Planning

 

Correct Answer: B

 

 

QUESTION 603

To ensure proper evidence collection, which of the following steps should be preformed FIRST?

 

A.

Take hashes from the live system

B.

Review logs

C.

Capture the system image

D.

Copy all compromised files

 

Correct Answer: C

 

 

QUESTION 604

Joe, the security administrator, has determined that one of his web servers is under attack. Which of the following can help determine where the attack originated from?

 

A.

Capture system image

B.

Record time offset

C.

Screenshots

D.

Network sniffing

 

Correct Answer: D

 

 

QUESTION 605

Joe, the system administrator, is performing an overnight system refresh of hundreds of user computers. The refresh has a strict timeframe and must have zero downtime during business hours. Which of the following should Joe take into consideration?

 

A.

A disk-based image of every computer as they are being replaced.

B.

A plan that skips every other replaced computer to limit the area of affected users.

C.

An offsite contingency server farm that can act as a warm site should any issues appear.

D.

A back-out strategy planned out anticipating any unforeseen problems that may arise.

 

Correct Answer: D

 

 

QUESTION 606

A program displays:

 

ERROR: this program has caught an exception and will now terminate.

 

Which of the following is MOST likely accomplished by the program’s behavior?

 

A.

Operating system’s integrity is maintained

B.

Program’s availability is maintained

C.

Operating system’s scalability is maintained

D.

User’s confidentiality is maintained

 

Correct Answer: A

 

QUESTION 607

A security administrator wants to deploy a physical security control to limit an individual’s access into a sensitive area. Which of the following should be implemented?

 

A.

Guards

B.

CCTV

C.

Bollards

D.

Spike strip

 

Correct Answer: A

 

 

QUESTION 608

A network administrator uses an RFID card to enter the datacenter, a key to open the server rack, and a username and password to logon to a server. These are examples of which of the following?

 

A.

Multifactor authentication

B.

Single factor authentication

C.

Separation of duties

D.

Identification

 

Correct Answer: B

 

 

QUESTION 609

Which of the following results in datacenters with failed humidity controls? (Select TWO).

 

A.

Excessive EMI

B.

Electrostatic charge

C.

Improper ventilation

D.

Condensation

E.

Irregular temperature

 

Correct Answer: BD

 

 

QUESTION 610

An online store wants to protect user credentials and credit card information so that customers can store their credit card information and use their card for multiple separate transactions. Which of the following database designs provides the BEST security for the online store?

 

A.

Use encryption for the credential fields and hash the credit card field

B.

Encrypt the username and hash the password

C.

Hash the credential fields and use encryption for the credit card field

D.

Hash both the credential fields and the credit card field

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.