Download New Updated (July) CompTIA SY0-401 Actual Test 561-570

Ensurepass

QUESTION 561

Which of the following tools would a security administrator use in order to identify all running services throughout an organization?

 

A.

Architectural review

B.

Penetration test

C.

Port scanner

D.

Design review

 

Correct Answer: C

 

 

QUESTION 562

Which of the following protocols provides transport security for virtual terminal
emulation?

 

A.

TLS

B.

SSH

C.

SCP

D.

S/MIME

 

Correct Answer: B

 

 

QUESTION 563

Based on information leaked to industry websites, business management is concerned that unauthorized employees are accessing critical project information for a major, well-known new product. To identify any such users, the security administrator could:

 

A.

Set up a honeypot and place false project documentation on an unsecure share.

B.

Block access to the project documentation using a firewall.

C.

Increase antivirus coverage of the project servers.

D.

Apply security updates and harden the OS on all project servers.

 

Correct Answer: A

 

 

QUESTION 564

Which of the following is an indication of an ongoing current problem?

 

A.

Alert

B.

Trend

C.

Alarm

D.

Trap

 

Correct Answer: C

 

 

QUESTION 565

Which of the following a programming interface that allows a remote computer to run programs on a local machine?

 

A.

RPC

B.

RSH

C.

SSH

D.

SSL

 

Correct Answer: A

 

 

QUESTION 566

Which of the following is the term for a fix for a known software problem?

 

A.

Skiff

B.

Patch

C.

Slipstream

D.

Upgrade

 

Correct Answer: B

 

 

QUESTION 567

Connections using point-to-point protocol authenticate using which of the following? (Select TWO).

 

A.

RIPEMD

B.

PAP

C.

CHAP

D.

RC4

E.

Kerberos

 

Correct Answer: BC

 

 

QUESTION 568

Which of the following will help prevent smurf attacks?

 

A.

Allowing necessary UDP packets in and out of the network

B.

Disabling directed broadcast on border routers

C.

Disabling unused services on the gateway firewall

D.

Flash the BIOS with the latest firmware

 

Correct Answer: B

 

 

QUESTION 569

An advantage of virtualizing servers, databases, and office applications is:

 

A.

Centralized management.

B.

Providing greater resources to users.

C.

Stronger access control.

D.

Decentralized management.

 

Correct Answer: A

 

 

QUESTION 570

A major security risk with co-mingling of hosts with different security requirements is:

 

A.

Security policy violations.

B.

Zombie attacks.

C.

Password compromises.

D.

Privilege creep.

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Real Tests (July) and tagged , , , , , , . Bookmark the permalink.