QUESTION 1001
Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?
A. |
Virtualization |
B. |
Patch management |
C. |
Full disk encryption |
D. |
Database encryption |
Correct Answer: C
QUESTION 1002
Which of the following does Jane, a software developer, need to do after compiling the source code of a program to attest the authorship of the binary?
A. |
Place Jane’s name in the binary metadata |
B. |
Use Jane’s private key to sign the binary |
C. |
Use Jane’s public key to sign the binary |
D. |
Append the source code to the binary |
Correct Answer: B
QUESTION 1003
The annual loss expectancy can be calculated by:
A. |
Dividing the annualized rate of return by single loss expectancy. |
B. |
Multiplying the annualized rate of return and the single loss expectancy. |
C. |
Subtracting the single loss expectancy from the annualized rate of return. |
D. |
Adding the single loss expectancy and the annualized rate of return. |
Correct Answer: B
QUESTION 1004
Which of the following should Jane, the security administrator, do FIRST when an employee reports the loss of a corporate mobile device?
A. |
Remotely lock the device with a PIN |
B. |
Enable GPS location and record from the camera |
C. |
Remotely uninstall all company software |
D. |
Remotely initiate a device wipe |
Correct Answer: D
QUESTION 1005
An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
A. |
Zero day |
B. |
Directory traversal |
C. |
Logic bomb |
D. |
Session hijacking |
Correct Answer: A
QUESTION 1006
Which of the following protocols would be implemented to secure file transfers using SSL?
A. |
TFTP |
B. |
SCP |
C. |
SFTP |
D. |
FTPS |
Correct Answer: D
QUESTION 1007
Which of the following are used to implement VPNs? (Select TWO).
A. |
SFTP |
B. |
IPSec |
C. |
HTTPS |
D. |
SNMP |
E. |
SSL |
Correct Answer: BE
QUESTION 1008
A company recently implemented a TLS on their network. The company is MOST concerned with:
A. |
Confidentiality |
B. |
Availability |
C. |
Integrity |
D. |
Accessibility |
Correct Answer: A
QUESTION 1009
Which of the following describes how an attacker can send unwanted advertisements to a mobile device?
A. |
Man-in-the-middle |
B. |
Bluejacking |
C. |
Bluesnarfing |
D. |
Packet sniffing |
Correct Answer: B
QUESTION 1010
A network device that protects an enterprise based only on source and destination addresses is BEST described as:
A. |
IDS |
B. |
ACL |
C. |
Stateful packet filtering |
D. |
Simple packet filtering |
Correct Answer: D
Free VCE & PDF File for CompTIA SY0-401 Real Exam
Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF