Ensurepass

QUESTION 941

The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client has been victimized by social engineering attacks which led to a loss of sensitive data. The security administrator advises the marketing department not to distribute the USB pens due to which of the following?

 

A.

The risks associated with the large capacity of USB drives and their concealable nature

B.

The security costs associated with securing the USB drives over time

C.

The cost associated with distributing a large volume of the USB pens

D.

The security risks associated with combining USB drives and cell phones on a network

 

Correct Answer: A

 

 

QUESTION 942

An administrator wishes to hide the network addresses of an internal network when connecting to the Internet. The MOST effective way to mask the network address of the users would be by passing the traffic through a:

 

A.

stateful firewall

B.

packet-filtering firewall

C.

NIPS

D.

NAT

 

Correct Answer: D

 

 

QUESTION 943

A security administrator forgets their card to access the server room. The administrator asks a coworker if they could use their card for the day. Which of the following is the administrator using to gain access to the server room?

 

A.

Man-in-the-middle

B.

Tailgating

C.

Impersonation

D.

Spoofing

 

Correct Answer: C

 

 

 

QUESTION 944

A security administrator has implemented a policy to prevent data loss. Which of the following is the BEST method of enforcement?

 

A.

Internet networks can be accessed via personally-owned computers.

B.

Data can only be stored on local workstations.

C.

Wi-Fi networks should use WEP encryption by default.

D.

Only USB devices supporting encryption are to be used.

 

Correct Answer: D

 

 

QUESTION 945

Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.

 

A.

Public keys, one time

B.

Shared keys, private keys

C.

Private keys, session keys

D.

Private keys, public keys

 

Correct Answer: B

 

 

QUESTION 946

The main corporate website has a service level agreement that requires availability 100% of the time, even in the case of a disaster. Which of the following would be required to meet this demand?

 

A.

Warm site implementation for the datacenter

B.

Geographically disparate site redundant datacenter

C.

Localized clustering of the datacenter

D.

Cold site implementation for the datacenter

 

Correct Answer: B

 

 

QUESTION 947

Which of the following is a vulnerability associated with disabling pop-up blockers?

 

A.

An alert message from the administrator may not be visible

B.

A form submitted by the user may not open

C.

The help window may not be displayed

D.

Another browser instance may execute malicious code

 

Correct Answer: D

 

 

QUESTION 948

A security technician needs to open ports on a firewall to allow for domain name resolution. Which of the following ports should be opened? (Select TWO).

 

A.

TCP 21

B.

TCP 23

C.

TCP 53

D.

UDP 23

E.

UDP 53

 

Correct Answer: CE

 

 

QUESTION 949

During an anonymous penetration test, Jane, a system administrator, was able to identify a shared print spool directory, and was able to download a document from the spool. Which statement BEST describes her privileges?

 

A.

All users have write access to the directory.

B.

Jane has read access to the file.

C.

All users have read access to the file.

D.

Jane has read access to the directory.

 

Correct Answer: C

 

 

QUESTION 950

An IT security technician is actively involved in identifying coding issues for her company. Which of the following is an application security technique that can be used to identify unknown weaknesses within the code?

 

A.

Vulnerability scanning

B.

Denial of service

C.

Fuzzing

D.

Port scanning

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.