Ensurepass

QUESTION 721

Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains?

 

Server 1: 192.168.100.6

Server 2: 192.168.100.9

Server 3: 192.169.100.20

 

A.

/24

B.

/27

C.

/28

D.

/29

E.

/30

 

Correct Answer: D

 

 

QUESTION 722

Which of the following offerings typically allows the customer to apply operating system patches?

 

A.

Software as a service

B.

Public Clouds

C.

Cloud Based Storage

D.

Infrastructure as a service

 

Correct Answer: D

 

 

QUESTION 723

A technician is unable to manage a remote server. Which of the following ports should be opened on the firewall for remote server management? (Select TWO).

 

A.

22

B.

135

C.

137

D.

143

E.

443

F.

3389

 

Correct Answer: AF

 

 

QUESTION 724

When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes. Which of the following design elements would be implemented to comply with the security administrator’s request?

 

A.

DMZ

B.

Cloud services

C.

Virtualization

D.

Sandboxing

 

Correct Answer: A

 

 

QUESTION 725

At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?

 

A.

Configure an access list.

B.

Configure spanning tree protocol.

C.

Configure port security.

D.

Configure loop protection.

 

Correct Answer: C

 

 

QUESTION 726

Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network printing?

 

A.

Port security

B.

Flood guards

C.

Loop protection

D.

Implicit deny

 

Correct Answer: D

 

 

QUESTION 727

Joe, a security administrator, believes that a network breach has occurred in the datacenter as a result of a misconfigured router access list, allowing outside access to an SSH server. Which of the following should Joe search for in the log files?

 

A.

Failed authentication attempts

B.

Network ping sweeps

C.

Host port scans

D.

Connections to port 22

 

Correct Answer: D

 

 

QUESTION 728

Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?

 

A.

Packet Filter Firewall

B.

Stateful Firewall

C.

Proxy Firewall

D.

Application Firewall

 

Correct Answer: B

 

 

QUESTION 729

A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access
?

 

A.

SCP

B.

SSH

C.

SFTP

D.

HTTPS

 

Correct Answer: B

 

 

QUESTION 730

Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group. Which of the following would prevent her from denying accountability?

 

A.

Email Encryption

B.

Steganography

C.

Non Repudiation

D.

Access Control

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.