Ensurepass

 

QUESTION 661

What is a system that is intended or designed to be broken into by an attacker?

 

A.

Honeypot

B.

Honeybucket

C.

Decoy

D.

Spoofing system

 

Correct Answer: A

 

 

QUESTION 662

How must user accounts for exiting employees be handled?

 

A.

Disabled, regardless of the circumstances

B.

Disabled if the employee has been terminated

C.

Deleted, regardless of the circumstances

D.

Deleted if the employee has been terminated

 

Correct Answer: A

 

 

QUESTION 663

Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST level of security training for the executives? (Select TWO).

 

A.

Acceptable use of social media

B.

Data handling and disposal

C.

Zero day exploits and viruses

D.

Phishing threats and attacks

E.

Clean desk and BYOD

F.

Information security awareness

 

Correct Answer: DF

 

 

QUESTION 664

Which of the following provides data the best fault tolerance at the LOWEST cost?

 

A.

Load balancing

B.

Clustering

C.

Server virtualization

D.

RAID 6

 

Correct Answer: D

 

 

QUESTION 665

The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO).

 

A.

Device encryption

B.

Antivirus

C.

Privacy screen

D.

Cable locks

E.

Remote wipe

 

Correct Answer: BD

 

 

QUESTION 666

A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used?

 

A.

RC4

B.

DES

C.

3DES

D.

AES

 

Correct Answer: D

 

 

QUESTION 667

Two programmers write a new secure application for the h
uman resources department to store personal identifiable information. The programmers make the application available to themselves using an uncommon port along with an ID and password only they know. This is an example of which of the following?

 

A.

Root Kit

B.

Spyware

C.

Logic Bomb

D.

Backdoor

 

Correct Answer: D

 

 

QUESTION 668

Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process?

 

A.

Separation of Duties

B.

Mandatory Vacations

C.

Discretionary Access Control

D.

Job Rotation

 

Correct Answer: A

 

 

QUESTION 669

The security department has implemented a new laptop encryption product in the environment. The product requires one user name and password at the time of boot up and also another password after the operating system has finished loading. This setup is using which of the following authentication types?

 

A.

Two-factor authentication

B.

Single sign-on

C.

Multifactor authentication

D.

Single factor authentication

 

Correct Answer: D

 

 

QUESTION 670

The Human Resources department has a parent shared folder setup on the server. There are two groups that have access, one called managers and one called staff. There are many sub folders under the parent shared folder, one is called payroll. The parent folder access control list propagates all subfolders and all subfolders inherit the parent permission. Which of the following is the quickest way to prevent the staff group from gaining access to the payroll folder?

 

A.

Remove the staff group from the payroll folder

B.

Implicit deny on the payroll folder for the staff group

C.

Implicit deny on the payroll folder for the managers group

D.

Remove inheritance from the payroll folder

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.