QUESTION 1021
Which of the following is designed to ensure high availability of web based applications?
A. |
Proxies |
B. |
Load balancers |
C. |
URL filtering |
D. |
Routers |
Correct Answer: B
QUESTION 1022
The administrator would like to implement hardware assisted full disk encryption on laptops. Which of the following would MOST likely be used t
o meet this goal?
A. |
TPM |
B. |
USB Drive |
C. |
Key Escrow |
D. |
PKI |
Correct Answer: A
QUESTION 1023
Jane, a security administrator, wants to harden the web server. Which of the following could she perform to accomplish this task?
A. |
Implement remote sanitization |
B. |
Disable unnecessary services |
C. |
Install mantraps in the datacenter |
D. |
Compare baseline configurations |
Correct Answer: B
QUESTION 1024
Which of the following policies could be implemented to help prevent users from displaying their login credentials in open view for everyone to see?
A. |
Privacy |
B. |
Clean desk |
C. |
Job rotation |
D. |
Password complexity |
Correct Answer: B
QUESTION 1025
Which of the following is another, more common, name for EAPOL?
A. |
LDAP |
B. |
802.1X |
C. |
LDAPS |
D. |
802.12 |
Correct Answer: B
QUESTION 1026
If you don’t know the MAC address of a Windows-based machine, what command-line utility can you use to ascertain it?
A. |
macconfig |
B. |
ifconfig |
C. |
ipconfig |
D. |
config |
Correct Answer: C
QUESTION 1027
In the Windows world, what tool is used to disable a port?
A. |
System Manager |
B. |
System Monitor |
C. |
Performance Monitor |
D. |
Windows Firewall |
Correct Answer: D
QUESTION 1028
A set of standardized system images with a pre-defined set of applications is used to build enduser workstations. The security administrator has scanned every workstation to create a current inventory of all applications that are installed on active workstations and is documenting which applications are out-of-date and could be exploited. The security administrator is determining the:
A. |
Attack surface. |
B. |
Application hardening effectiveness. |
C. |
Application bas |
D. |
OS hardening effectiveness. |
Correct Answer: A
QUESTION 1029
A perimeter survey finds that the wireless network within a facility is easily reachable outside of the physical perimeter. Which of the following should be adjusted to mitigate this risk?
A. |
CCMP |
B. |
MAC filter |
C. |
SSID broadcast |
D. |
Power level controls |
Correct Answer: D
QUESTION 1030
Which of the following would verify that a threat does exist and security controls can easily be bypassed without actively testing an application?
A. |
Protocol analyzer |
B. |
Vulnerability scan |
C. |
Penetration test |
D. |
Port scanner |
Correct Answer: B
Free VCE & PDF File for CompTIA SY0-401 Real Exam
Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF