Ensurepass

QUESTION 281

Which of the following technologies uses multiple devices to share work?

 

A.

Switching

B.

Load balancing

C.

RAID

D.

VPN concentrator

 

Correct Answer: B

 

 

QUESTION 282

Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?

 

A.

SFTP

B.

HTTPS

C.

TFTP

D.

TLS

 

Correct Answer: D

 

 

QUESTION 283

Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?

 

A.

Man-in-the-middle

B.

Bluejacking

C.

Bluesnarfing

D.

Packet sniffing

 

Correct Answer: B

 

 

QUESTION 284

Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task?

(Select TWO).

 

A.< /span>

Private hash

B.

Recovery agent

C.

Public key

D.

Key escrow

E.

CRL

 

Correct Answer: BD

 

 

QUESTION 285

Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?

 

A.

Incident management

B.

Server clustering

C.

Change management

D.

Forensic analysis

Correct Answer: C

 

 

QUESTION 286

Which of the following can Pete, a security administrator, use to distribute the processing effort

when generating hashes for a password cracking program?

 

A.

RAID

B.

Clustering

C.

Redundancy

D.

Virtualization

 

Correct Answer: B

 

 

QUESTION 287

Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?

 

A.

Identify user habits

B.

Disconnect system from network

C.

Capture system image

D.

Interview witnesses

 

Correct Answer: C

 

 

QUESTION 288

Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point?

 

A.

Placement of antenna

B.

Disabling the SSID

C.

Implementing WPA2

D.

Enabling the MAC filtering

 

Correct Answer: A

 

 

QUESTION 289

Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?

 

A.

Implement WPA

B.

Disable SSID

C.

Adjust antenna placement

D.

Implement WEP

 

Correct Answer: A

 

 

 

QUESTION 290

Which of the following is a management control?

 

A.

Logon banners

B.

Written security policy

C.

SYN attack prevention

D.

Access Control List (ACL)

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.