[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 781-790

Ensurepass

QUESTION 781

Which of the following has serious security implications for large organizations and can potentially allow an attacker to capture conversations?

 

A.

Subnetting

B.

NAT

C.

Jabber

D.

DMZ

 

Correct Answer: C

 

 

QUESTION 782

Upper management decides which risk to mitigate based on cost. This is an example of:

 

A.

Qualitative risk assessment

B.

Business impact analysis

C.

Risk management framework

D.

Quantitative risk assessment

 

Correct Answer: D

 

 

QUESTION 783

Matt, a security administrator, wants to ensure that the message he is sending does not get intercepted or modified in transit. This concern relates to which of the following concepts?

 

A.

Availability

B.

Integrity

C.

Accounting

D.

Confidentiality

 

Correct Answer: B

 

 

QUESTION 784

Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption?

 

A.

AES

B.

Blowfish

C.

RC5

D.

3DES

 

Correct Answer: B

 

 

QUESTION 785

Which of the following best practices makes a wireless network more difficult to find?

 

A.

Implement MAC filtering

B.

UseWPA2-PSK

C.

Disable SSID broadcast

D.

Power down unused WAPs

 

Correct Answer: C

 

 

QUESTION 786

The use of social networking sites introduces the risk of:

 

A.

Disclosure of proprietary information

B.

Data classification issues

C.

Data availability issues

D.

Broken chain of custody

 

Correct Answer: A

 

 

QUESTION 787

Which the following flags are used to establish a TCP connection? (Select TWO).

 

A.

PSH

B.

ACK

C.

SYN

D.

URG

E.

FIN

 

Correct Answer: BC

 

 

QUESTION 788

Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?

 

A.

Error and exception handling

B.

Application hardening

C.

Application patch management

D.

Cross-site script prevention

 

Correct Answer: B

 

 

QUESTION 789

Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?

 

A.

RIPEMD

B.

MD5

C.

SHA

D.

HMAC

 

Correct Answer: D

 

 

QUESTION 790

Visitors entering a building are required to close the back door before the front door of the same entry room is open. Which of the following is being described?

 

A.

Tailgating

B.

Fencing

C.

Screening

D.

Mantrap

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Practice Tests (February 2016) and tagged , , , , , , , . Bookmark the permalink.