[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 1001-1010

Ensurepass

QUESTION 1001

Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?

 

A.

Virtualization

B.

Patch management

C.

Full disk encryption

D.

Database encryption

 

Correct Answer: C

 

QUESTION 1002

Which of the following does Jane, a software developer, need to do after compiling the source code of a program to attest the authorship of the binary?

 

A.

Place Jane’s name in the binary metadata

B.

Use Jane’s private key to sign the binary

C.

Use Jane’s public key to sign the binary

D.

Append the source code to the binary

 

Correct Answer: B

 

 

QUESTION 1003

The annual loss expectancy can be calculated by:

 

A.

Dividing the annualized rate of return by single loss expectancy.

B.

Multiplying the annualized rate of return and the single loss expectancy.

C.

Subtracting the single loss expectancy from the annualized rate of return.

D.

Adding the single loss expectancy and the annualized rate of return.

 

Correct Answer: B

 

 

QUESTION 1004

Which of the following should Jane, the security administrator, do FIRST when an employee reports the loss of a corporate mobile device?

 

A.

Remotely lock the device with a PIN

B.

Enable GPS location and record from the camera

C.

Remotely uninstall all company software

D.

Remotely initiate a device wipe

 

Correct Answer: D

 

 

QUESTION 1005

An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?

 

A.

Zero day

B.

Directory traversal

C.

Logic bomb

D.

Session hijacking

 

Correct Answer: A

 

 

QUESTION 1006

Which of the following protocols would be implemented to secure file transfers using SSL?

 

A.

TFTP

B.

SCP

C.

SFTP

D.

FTPS

 

Correct Answer: D

 

 

QUESTION 1007

Which of the following are used to implement VPNs? (Select TWO).

 

A.

SFTP

B.

IPSec

C.

HTTPS

D.

SNMP

E.

SSL

 

Correct Answer: BE

 

 

QUESTION 1008

A company recently implemented a TLS on their network. The company is MOST concerned with:

 

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Accessibility

 

Correct Answer: A

 

 

QUESTION 1009

Which of the following describes how an attacker can send unwanted advertisements to a mobile device?

 

A.

Man-in-the-middle

B.

Bluejacking

C.

Bluesnarfing

D.

Packet sniffing

 

Correct Answer: B

 

 

QUESTION 1010

A network device that protects an enterprise based only on source and destination addresses is BEST described as:

 

A.

IDS

B.

ACL

C.

Stateful packet filtering

D.

Simple packet filtering

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Practice Tests (February 2016) and tagged , , , , , , , . Bookmark the permalink.