Ensurepass

QUESTION 261

Which of the following protocols is used to authenticate the client and server’s digital certificate?

 

A.

PEAP

B.

DNS

C.

TLS

D.

ICMP

 

Correct Answer: C

 

 

QUESTION 262

Which of the following can be used to mitigate risk if a mobile device is lost?

 

A.

Cable lock

B.

Transport encryption

C.

Voice encryption

D.

Strong passwords

 

Correct Answer: D

 

 

QUESTION 263

Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?

 

A.

Record time offset

B.

Clean desk policy

C.

Cloud computing

D.

Routine log review

 

Correct Answer: B

 

 

QUESTION 264

Which of the following is an example of multifactor authentication?

 

A.

Credit card and PIN

B.

Username and password

C.

Password and PIN

D.

Fingerprint and retina scan

 

Correct Answer: A

 

 

QUESTION 265

After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:

 

`Please only use letters and numbers on these fields’

 

Which of the following is this an example of?

 

A.

Proper error handling

B.

Proper input validation

C.

Improper input validation

D.

Improper error handling

 

Correct Answer: B

 

 

QUESTION 266

Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE).

 

A.

< font style="font-size: 10pt" color="#000000">Spam filter

B.

Load balancer

C.

Antivirus

D.

Proxies

E.

Firewall

F.

NIDS

G.

URL filtering

 

Correct Answer: DEG

 

 

QUESTION 267

Several bins are located throughout a building for secure disposal of sensitive information.

 

Which of the following does this prevent?

 

A.

Dumpster diving

B.

War driving

C.

Tailgating

D.

War chalking

 

Correct Answer: A

 

 

QUESTION 268

Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?

 

A.

Application design

B.

Application security

C.

Initial baseline configuration

D.

Management of interfaces

 

Correct Answer: C

 

 

 

 

 

 

QUESTION 269

Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?

 

A.

Acceptable Use Policy

B.

Physical security controls

C.

Technical controls

D.

Security awareness training

 

Correct Answer: D

 

 

QUESTION 270

Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task?

 

A.

HIDS

B.

Firewall

C.

NIPS

D.

Spam filter

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.