[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 1031-1040

Ensurepass

QUESTION 1031

An administrator values transport security strength above network speed when implementing an SSL VPN. Which of the following encryption ciphers would BEST meet their needs?

 

A.

SHA256

B.

RC4

C.

3DES

D.

AES128

 

Correct Answer: D

 

 

QUESTION 1032

All of the following are encryption types EXCEPT:

 

A.

Full disk

B.

SMIME

C.

File and folder

D.

RADIUS

 

Correct Answer: D

 

 

QUESTION 1033

Which of the following is used by Matt, a security administrator, to lower the risks associated with electrostatic discharge, corrosion, and thermal breakdown?

 

A.

Temperature and humidity controls

B.

Routine audits

C.

Fire suppression and EMI shielding

D.

Hot and cold aisles

 

Correct Answer: A

 

 

QUESTION 1034

When integrating source material from an open source project into a highly secure environment, which of the following precautions should prevent hidden threats?

 

A.

Design review

B.

Code review

C.

Risk assessment

D.

Vulnerability scan

 

Correct Answer: B

 

 

QUESTION 1035

Which of the following would MOST likely belong in the DMZ? (Select TWO).

 

A.

Finance servers

B.

Backup servers

C.

Web servers

D.

SMTP gateways

E.

Laptops

 

Correct Answer: CD

 

 

 

 

 

QUESTION 1036

When verifying file integrity on a remote system that is bandwidth limited, which of the following tool combinations provides the STRONGEST confidence?

 

A.

MD5 and 3DES

B.

MD5 and SHA-1

C.

SHA-256 and RSA

D.

SHA-256 and AES

 

Correct Answer: B

 

 

QUESTION 1037

Which of the following technologies can store multi-tenant data with different security requirements?

 

A.

Data loss prevention

B.

Trusted platform module

C.

Hard drive encryption

D.

Cloud computing

 

Correct Answer: D

 

 

QUESTION 1038

An attacker used an undocumented and unknown application exploit to gain access to a file server. Which of the following BEST describes this type of attack?

 

A.

Integer overflow

B.

Cross-site scripting

C.

Zero-day

D.

Session hijacking

E.

XML injection

 

Correct Answer: C

 

 

QUESTION 1039

Deploying a wildcard certificate is one strategy to:

 

A.

Secure the certificate’s private key.

B.

Increase the certificate’s encryption key length.

C.

Extend the renewal date of the certificate.

D.

Reduce the certificate management burden.

 

Correct Answer: D

 

 

QUESTION 1040

On a train, an individual is watching a proprietary video on Joe’s laptop without his knowledge. Which of the following does this describe?

 

A.

Tailgating

B.

Shoulder surfing

C.

Interference

D.

Illegal downloading

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Practice Tests (February 2016) and tagged , , , , , , , . Bookmark the permalink.