[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 251-260

Ensurepass

QUESTION 251

A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?

 

A.

RADIUS

B.

TACACS+

C.

Kerberos

D.

LDAP

 

Correct Answer: B

 

QUESTION 252

Which of the following can use RC4 for encryption? (Select TWO).

 

A.

CHAP

B.

SSL

C.

WEP

D.

AES

E.

3DES

 

Correct Answer: BC

 

 

QUESTION 253

Which of the following defines a business goal for system re
storation and acceptable data loss?

 

A.

MTTR

B.

MTBF

C.

RPO

D.

Warm site

 

Correct Answer: C

 

 

QUESTION 254

If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing?

 

A.

Transitive trust

B.

Public key trust

C.

Certificate authority trust

D.

Domain level trust

 

Correct Answer: A

 

 

QUESTION 255

Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?

 

A.

Business continuity planning

B.

Continuity of operations

C.

Business impact analysis

D.

Succession planning

 

Correct Answer: D

 

 

QUESTION 256

Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?

 

A.

Recovery agent

B.

Certificate authority

C.

Trust model

D.

Key escrow

 

Correct Answer: A

 

 

QUESTION 257

Which of the following devices will help prevent a laptop from being removed from a certain location?

 

A.

Device encryption

B.

Cable locks

C.

GPS tracking

D.

Remote data wipes

 

Correct Answer: B

 

 

QUESTION 258

Which of the following is the MOST secure protocol to transfer files?

 

A.

FTP

B.

FTPS

C.

SSH

D.

TELNET

 

Correct Answer: B

 

 

QUESTION 259

Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms?

 

A.

Signature based IPS

B.

Signature based IDS

C.

Application based IPS

D.

Anomaly based IDS

 

Correct Answer: D

 

 

QUESTION 260

A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?

 

A.

Command shell restrictions

B.

Restricted interface

C.

Warning banners

D.

Session output pipe to /dev/null

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized and tagged , , , , , , , . Bookmark the permalink.