Ensurepass

QUESTION 571

Which of the following attacks targets high level executives to gain company information?

 

A.

Phishing

B.

Whaling

C.

Vishing

D.

Spoofing

 

Correct Answer: B

 

 

QUESTION 572

Which of the following can be used as an equipment theft deterrent?

 

A.

Screen locks

B.

GPS tracking

C.

Cable locks

D.

Whole disk encryption

 

Correct Answer: C

 

 

QUESTION 573

At the outside break area, an employee, Ann, asked another employee to let her into the building because her badge is missing. Which of the following does this describe?

 

A.

Shoulder surfing

B.

Tailgating

C.

Whaling

D.

Impersonation

 

Correct Answer: B

 

 

QUESTION 574

A company that has a mandatory vacation policy has implemented which of the following controls?

 

A.

Risk control

B.

Privacy control

C.

Technical control

D.

Physical control

 

Correct Answer: A

 

 

 

 

QUESTION 575

Which of the following is the MOST intrusive type of testing against a production system?

 

A.

White
box testing

B.

War dialing

C.

Vulnerability testing

D.

Penetration testing

 

Correct Answer: D

 

 

QUESTION 576

The IT department has installed new wireless access points but discovers that the signal extends far into the parking lot. Which of the following actions should be taken to correct this?

 

A.

Disable the SSID broadcasting

B.

Configure the access points so that MAC filtering is not used

C.

Implement WEP encryption on the access points

D.

Lower the power for office coverage only

 

Correct Answer: D

 

 

QUESTION 577

Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?

 

A.

Protocol analyzer

B.

Load balancer

C.

VPN concentrator

D.

Web security gateway

 

Correct Answer: B

 

 

QUESTION 578

Which of the following uses port 22 by default? (Select THREE).

 

A.

SSH

B.

SSL

C.

TLS

D.

SFTP

E.

SCP

F.

FTPS

G.

SMTP

H.

SNMP

 

Correct Answer: ADE

 

 

 

 

 

QUESTION 579

Ann, a software developer, has installed some code to reactivate her account one week after her account has been disabled. Which of the following is this an example of? (Select TWO).

 

A.

Rootkit

B.

Logic Bomb

C.

Botnet

D.

Backdoor

E.

Spyware

 

Correct Answer: BD

 

 

QUESTION 580

The string:

 

` or 1=1– –

 

Represents which of the following?

 

A.

Bluejacking

B.

Rogue access point

C.

SQL Injection

D.

Client-side attacks

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.