[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 821-830

Ensurepass

QUESTION 821

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

 

A.

Penetration test

B.

Code review

C.

Vulnerability scan

D.

Brute Force scan

 

Correct Answer: C

 

 

QUESTION 822

Which of the following authentication services uses a ticket granting system to provide
access?

 

A.

RADIUS

B.

LDAP

C.

TACACS+

D.

Kerberos

 

Correct Answer: D

 

 

QUESTION 823

Matt, a security administrator, wants to configure all the switches and routers in the network in order to securely monitor their status. Which of the following protocols would he need to configure on each device?

 

A.

SMTP

B.

SNMPv3

C.

IPSec

D.

SNMP

 

Correct Answer: B

 

 

QUESTION 824

Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue and still provide coverage where needed? (Select TWO).

 

A.

Disable the wired ports

B.

Use channels 1, 4 and 7 only

C.

Enable MAC filtering

D.

Disable SSID broadcast

E.

Switch from 802.11a to 802.11b

 

Correct Answer: CD

 

 

QUESTION 825

The public key is used to perform which of the following? (Select THREE).

 

A.

Validate the CRL

B.

Validate the identity of an email sender

C.

Encrypt messages

D.

Perform key recovery

E.

Decrypt messages

F.

Perform key escrow

 

Correct Answer: BCE

 

 

QUESTION 826

Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?

 

A.

NAT

B.

Virtualization

C.

NAC

D.

Subnetting

 

Correct Answer: D

 

 

 

QUESTION 827

Which of the following would BEST be used to calculate the expected loss of an event, if the likelihood of an event occurring is known? (Select TWO).

 

A.

DAC

B.

ALE

C.

SLE

D.

ARO

E.

ROI

 

Correct Answer: BC

 

 

QUESTION 828

An administrator wants to minimize the amount of time needed to perform backups during the week. It is also acceptable to the administrator for restoration to take an extended time frame. Which of the following strategies would the administrator MOST likely implement?

 

A.

Full backups on the weekend and incremental during the week

B.

Full backups on the weekend and full backups every day

C.

Incremental backups on the weekend and differential backups every day

D.

Differential backups on the weekend and full backups every day

 

Correct Answer: A

 

 

QUESTION 829

Which of the following ca
n be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to restore those services?

 

A.

Hot site

B.

Warm site

C.

Cold site

D.

Mobile site

 

Correct Answer: D

 

 

QUESTION 830

Which of the following is BEST utilized to identify common misconfigurations throughout the enterprise?

 

A.

Vulnerability scanning

B.

Port scanning

C.

Penetration testing

D.

Black box

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Practice Tests (February 2016) and tagged , , , , , , , . Bookmark the permalink.