[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 671-680

Ensurepass

QUESTION 671

The finance department works with a bank which has recently had a number of cyber attacks. The finance department is concerned that the banking website certificates have been compromised. Which of the following can the finance department check to see if any of the bank’s certificates are still valid?

 

A.

Bank’s CRL

B.

Bank’s private key

C.

Bank’s key escrow

D.

Bank’s recovery agent

 

Correct Answer: A

 

 

QUESTION 672

Which of the following are examples of network segmentation? (Select TWO).

 

A.

IDS

B.

IaaS

C.

DMZ

D.

Subnet

E.

IPS

 

Correct Answer: CD

 

 


QUESTION 673

Which of the following provides the strongest authentication security on a wireless network?

 

A.

MAC filter

B.

WPA2

C.

WEP

D.

Disable SSID broadcast

 

Correct Answer: B

 

 

QUESTION 674

Which of the following provides the BEST explanation regarding why an organization needs to implement IT security policies?

 

A.

To ensure that false positives are identified

B.

To ensure that staff conform to the policy

C.

To reduce the organizational risk

D.

To require acceptable usage of IT systems

 

Correct Answer: C

 

 

QUESTION 675

An incident response team member needs to perform a forensics examination but does not have the required hardware. Which of the following will allow the team member to perform the examination with minimal impact to the potential evidence?

 

A.

Using a software file recovery disc

B.

Mounting the drive in read-only mode

C.

Imaging based on order of volatility

D.

Hashing the image after capture

 

Correct Answer: B

 

 

QUESTION 676

Which of the following allows an organization to store a sensitive PKI component with a trusted third party?

 

A.

Trust model

B.

Public Key Infrastructure

C.

Private key

D.

Key escrow

 

Correct Answer: D

 

 

QUESTION 677

Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?

 

A.

Sniffer

B.

Router

C.

Firewall

D.

Switch

 

Correct Answer: C

 

 

QUESTION 678

A software firm posts patches and updates to a publicly accessible FTP site. The software firm also posts digitally signed checksums of all patches and updates. The firm does this to address:

 

A.

Integrity of downloaded software.

B.

Availability of the FTP site.

C.

Confidentiality of downloaded software.

D.

Integrity of the server logs.

 

Correct Answer: A

 

 

 

QUESTION 679

An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files should be copied from srv4 to accomplish this?

 

A.

certificate, private key, and intermediate certificate chain

B.

certificate, intermediate certificate chain, and root certificate

C.

certificate, root certificate, and certificate signing request

D.

certificate, public key, and certificate signing request

 

Correct Answer: A

 

 

QUESTION 680

When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com. Which of the following BEST describes this type of record?

 

A.

DNSSEC record

B.

IPv4 DNS record

C.

IPSEC DNS record

D.

IPv6 DNS record

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized and tagged , , , , , , , . Bookmark the permalink.