Ensurepass

QUESTION 1101

Which of the following is the BEST reason for placing a password lock on a mobile device?

 

A.

Prevents an unauthorized user from accessing owner’s data

B.

Enables remote wipe capabilities

C.

Stops an unauthorized user from using the device again

D.

Prevents an unauthorized user from making phone calls

 

Correct Answer: A

 

 

QUESTION 1102

Joe is the accounts payable agent for ABC Company. Joe has been performing accounts payable function for the ABC Company without any supervision. Management has noticed several new accounts without billing invoices that were paid. Which of the following is the BEST management option for review of the new accounts?

 

A.

Mandatory vacation

B.

Job rotation

C.

Separation of duties

D.

Replacement

 

Correct Answer: A

 

 

 

 

 

 

 

 

QUESTION 1103

Ann, the network administrator, is receiving reports regarding a particular wireless network in the building. The network was implemented for specific machines issued to the developer department, but the developers are stating that they are having connection issues as well as slow bandwidth. Reviewing the wireless router’s logs, she sees that devices not belonging to the developers are connecting to the access point. Which of the following would BEST alleviate the developer’s reports?

 

A.

Configure the router so that wireless access is based upon the connecting device’s hardware address.

B.

Modify the connection’s encryption method so that it is using WEP instead of WPA2.

C.

Implement connections via secure tunnel with additional software on the developer’s computers.

D.

Configure the router so that its name is not visible to devices scanning for wireless networks.

 

Correct Answer: A

 

 

QUESTION 1104

Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive client files had risen far above normal. Which of the following kind of IDS is in use?

 

A.

Protocol based

B.

Heuristic based

C.

Signature based

D.

Anomaly based

 

Correct Answer: D

 

 

QUESTION 1105

An organization recently switched from a cloud-based email solution to an in-house email server. The firewall needs to be modified to allow for sending and receiving email. Which of the following ports should be open on the firewall to allow for email traffic? (Select THREE).

 

A.

TCP 22

B.

TCP 23

C.

TCP 25

D.

TCP 53

E.

TCP 110

F.

TCP 143

G.

TCP 445

 

Correct Answer: CEF

 

 

QUESTION 1106

A company hosts its public websites internally. The administrator would like to make some changes to the architecture.

 

The three goals are:

 

(1) reduce the number of public IP addresses in use by the web servers

 

(2) drive all the web traffic through a central point of control

 

(3) mitigate automated attacks that are based on IP address scanning

 

Which of the following would meet all three goals?

 

A.

Firewall

B.

Load balancer

C.

URL filter

D.

Reverse proxy

 

Correct Answer: D

 

 

QUESTION 1107

Ann is the data owner of financial records for a company. She has requested that she have the ability to assign read and write privileges to her folders. The network administrator is tasked with setting up the initial access control system and handing Ann’s administrative capabilities. Which of the following systems should be deployed?

 

A.

Role-based

B.

Mandatory

C.

Discretionary

D.

Rule-based

 

Correct Answer: C

 

 

QUESTION 1108

The IT department noticed that there was a significant decrease in network performance during the afternoon hours. The IT department performed analysis of the network and discovered this was due to users accessing and downloading music and video streaming from social sites. The IT department notified corporate of their findings and a memo was sent to all employees addressing the misuse of company resources and requesting adherence to company policy. Which of the following policies is being enforced?

 

A.

Acceptable use policy

B.

Telecommuting policy

C.

Data ownership policy

D.

Non disclosure policy

 

Correct Answer: A

 

 

QUESTION 1109

A computer security officer has investigated a possible data breach and has found it credible. The officer notifies the data center manager and the Chief Information Security Officer (CISO). This is an example of:

 

A.

escalation and notification.

B.

first responder.

C.

incident identification.

D.

incident mitigation.

 

Correct Answer: A

 

 

QUESTION 1110

A small company wants to employ PKI. The company wants a cost effective solution that must be simple and trusted. They are considering two options: X.509 and PGP. Which of the following would be the BEST option?

 

A.

PGP, because it employs a web-of-trust that is the most trusted form of PKI.

B.

PGP, because it is simple to incorporate into a small environment.

C.

X.509, because it uses a hierarchical design that is the most trusted form of PKI.

D.

X.509, because it is simple to incorporate into a small environment.

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.