Ensurepass

QUESTION 1191

The security manager must store a copy of a sensitive document and needs to verify at a later point that the document has not been altered. Which of the following will accomplish the security manager’s objective?

 

A.

RSA

B.

AES

C.

MD5

D.

SHA

Correct Answer: C

 

 

QUESTION 1192

A security Operations Center was scanning a subnet for infections and found a contaminated machine. One of the administrators disabled the switch port that the machine was connected to, and informed a local technician of the infection. Which of the following steps did the administrator perform?

 

A.

Escalation

B.

Identification

C.

Notification

D.

Quarantine

E.

Preparation

 

Correct Answer: CD

 

 

QUESTION 1193

A security administrator wants to block unauthorized access to a web server using a locally installed software program. Which of the following should the administrator deploy?

 

A.

NIDS

B.

HIPS

C.

NIPS

D.

HIDS

 

Correct Answer: B

 

 

QUESTION 1194

A network administrator has identified port 21 being open and the lack of an IDS as a potential risk to the company. Due to budget constraints, FTP is the only option that the company can is to transfer data and network equipment cannot be purchased. Which of the following is this known as?

 

A.

Risk transference

B.

Risk deterrence

C.

Risk acceptance

D.

Risk avoidance

 

Correct Answer: C

 

 

QUESTION 1195

A security administrator is investigating a recent server breach. The breach occurred as a result of a zero-day attack against a user program running on the server. Which of the following logs should the administrator search for information regarding the breach?

 

A.

Application log

B.

Setup log

C.

Authentication log

D.

System log

Correct Answer: A

 

 

QUESTION 1196

A user attempts to install new and relatively unknown software recommended by a colleague. The user is unable to install the program, despite having successfully installed other programs previously. Which of the following is MOST likely the cause for the user’s inability to complete the installation?

 

A.

Application black listing

B.

Network Intrusion Prevention System

C.

Group policy

D.

Application white listing

 

Correct Answer: A

 

 

QUESTION 1197

A system administrator is configuring shared secrets on servers and clients. Which of the following authentication services is being deployed by the administrator? (Select two.)

 

A.

Kerberos

B.

RADIUS

C.

TACACS+

D.

LDAP

E.

Secure LDAP

 

Correct Answer: BD

 

 

QUESTION 1198

The finance department just procured a software application that needs to communicate back to the vendor server via SSL. Which of the following default ports on the firewall must the security engineer open to accomplish this task?

 

A.

80

B.

130

C.

443

D.

3389

 

Correct Answer: C

 

 

QUESTION 1199

After an audit, it was discovered that an account was not disabled in a timely manner after an employee has departed from the organization. Which of the following did the organization fail to properly implement?

 

A.

Routine account audits

B.

Account management processes

C.

Change management processes

D.

User rights and permission reviews

 

Correct Answer: A

 

 

QUESTION 1200

The Chief Security Officer (CSO) for a datacenter in a hostile environment is concerned about protecting the facility from car bomb attacks. Which of the following BEST would protect the building from this threat? (Select two.)

 

A.

Dogs

B.

Fencing

C.

CCTV

D.

Guards

E.

Bollards

F.

Lighting

 

Correct Answer: BE

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.