Ensurepass

QUESTION 971

Used in conjunction, which of the following are PII? (Select TWO).

 

A.

Marital status

B.

Favorite movie

C.

Pet’s name

D.

Birthday

E.

Full name

 

Correct Answer: DE

 

 

 

QUESTION 972

Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?

 

A.

Check the referrer field in the HTTP header

B.

Disable Flash content

C.

Use only cookies for authentication

D.

Use only HTTPS URLs

 

Correct Answer: A

 

 

QUESTION 973

Which of the following practices is used to mitigate a known security vulnerability?

 

A.

Application fuzzing

B.

Patch management

C.

Password cracking

D.

Auditing security logs

 

Correct Answer: B

 

 

QUESTION 974

Which of the following would Jane, an administrator, use to detect an unknown security vulnerability?

 

A.

Patch management

B.

Application fuzzing

C.

ID badge

D.

Application configuration baseline

 

Correct Answer: B

 

 

QUESTION 975

When reviewing a digital certificate for accuracy, which of the following would Matt, a security administrator, focus on to determine who affirms the identity of the certificate owner?

 

A.

Trust models

B.

CRL

C.

CA

D.

Recovery agent

 

Correct Answer: C

 

 

QUESTION 976

Which of the following is a notification that an unusual condition exists and should be investigated?

 

A.

< span lang="EN-US" style="font-family: ; mso-font-kerning: 0pt; mso-no-proof: yes">Alert

B.

Trend

C.

Alarm

D.

Trap

 

Correct Answer: A

 

 

QUESTION 977

If you don’t know the MAC address of a Linux-based machine, what command-line utility can you use to ascertain it?

 

A.

macconfig

B.

ifconfig

C.

ipconfig

D.

config

 

Correct Answer: B

 

 

QUESTION 978

Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).

 

A.

Disable the USB root hub within the OS.

B.

Install anti-virus software on the USB drives.

C.

Disable USB within the workstations BIOS.

D.

Apply the concept of least privilege to USB devices.

E.

Run spyware detection against all workstations.

 

Correct Answer: AC

 

 

QUESTION 979

An administrator is assigned to monitor servers in a data center. A web server connected to the Internet suddenly experiences a large spike in CPU activity. Which of the following is the MOST likely cause?

 

A.

Spyware

B.

Trojan

C.

Privilege escalation

D.

DoS

 

Correct Answer: D

 

 

QUESTION 980

Why would a technician use a password cracker?

 

A.

To look for weak passwords on the network

B.

To change a users passwords when they leave the company

C.

To enforce password complexity requirements

D.

To change users passwords if they have forgotten them

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.