[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 1081-1090

Ensurepass

QUESTION 1081

Which of the following is a directional antenna that can be used in point-to-point or point-to-multi- point WiFi communication systems? (Select TWO).

 

A.

Backfire

B.

Dipole

C.

Omni

D.

PTZ

E.

Dish

 

Correct Answer: AE

 

 

QUESTION 1082

A large bank has moved back office operations offshore to another country with lower wage costs in an attempt to improve profit and productivity. Which of the following would be a customer concern if the offshore staff had direct access to their data?

 

A.

Service level agreements

B.

Interoperability agreements

C.

Privacy considerations

D.

Data ownership

 

Correct Answer: C

 

 

QUESTION 1083

Which of the following are examples of detective controls?

 

A.

Biometrics, motion sensors and mantraps.

B.

Audit, firewall, anti-virus and biometrics.

C.

Motion sensors, intruder alarm and audit.

D.

Intruder alarm, mantraps and firewall.

 

Correct Answer: C

 

 

QUESTION 1084

Which of the following attacks impact the availability of a system? (Select TWO).

 

A.

Smurf

B.

Phishing

C.

Spim

D.

DDoS

E.

Spoofing

 

Correct Answer: AD

 

 

QUESTION 1085

Which of the following types of technologies is used by security and research personnel for identification and analysis of new security threats in a networked environment by using false data/hosts for information collection?

 

A.

Honeynet

B.

Vulnerability scanner

C.

Port scanner

D.

Protocol analyzer

 

Correct Answer: A

 

 

QUESTION 1086

An organization processes credit card transactions and is concerned that an employee may intentionally email credit card numbers to external email addresses. This company should consider which of the following technologies?

 

A.

IDS

B.

Firewalls

C.

DLP

D.

IPS

 

Correct Answer: C

 

QUESTION 1087

A computer is found to be infected with malware and a technician re-installs the operating system. The computer remains infected with malware. This is an example of:

 

A.

a rootkit.

B.

a MBR infection.

C.

an exploit kit.

D.

Spyware.

 

Correct Answer: B

 

 

QUESTION 1088

Which of the following, if properly implemented, would prevent users from accessing files that are unrelated to their job duties? (Select TWO).

 

A.

Separation of duties

B.

Job rotation

C.

Mandatory vacation

D.

Time of day restrictions

E.

Least privilege

 

Correct Answer: AE

 

 

QUESTION 1089

Which of the following would be MOST appropriate to secure an existing SCADA system by preventing connections from unauthorized networks?

 

A.

Implement a HIDS to protect the SCADA system

B.

Implement a Layer 2 switch to access the SCADA system

C.

Implement a firewall to protect the SCADA system

D.

Implement a NIDS to protect the SCADA system

 

Correct Answer: C

 

 

QUESTION 1090

The common method of breaking larger network address space into smaller networks is known as:

 

A.

subnetting.

B.

phishing.

C.

virtualization.

D.

packet filtering.

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Practice Tests (February 2016) and tagged , , , , , , , . Bookmark the permalink.