[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 861-870

Ensurepass

QUESTION 861

When employees that use certificates leave the company they should be added to which of the following?

 

A.

PKI

B.

CA

C.

CRL

D.

TKIP

 

Correct Answer: C

 

 

QUESTION 862

Several departments within a company have a business need to send high volumes of confidential information to customers via email. Which of the following is the
BEST solution to mitigate unintentional exposure of confidential information?

 

A.

Employ encryption on all outbound emails containing confidential information.

B.

Employ exact data matching and prevent inbound emails with Data Loss Prevention.

C.

Employ hashing on all outbound emails containing confidential information.

D.

Employ exact data matching and encrypt inbound e-mails with Data Loss Prevention.

 

Correct Answer: A

 

 

QUESTION 863

An administrator is looking to implement a security device which will be able to not only detect network intrusions at the organization level, but help defend against them as well. Which of the following is being described here?

 

A.

NIDS

B.

NIPS

C.

HIPS

D.

HIDS

 

Correct Answer: B

 

 

QUESTION 864

A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened on the firewall in order for this VPN to function properly? (Select TWO).

 

A.

UDP 1723

B.

TCP 500

C.

TCP 1723

D.

UDP 47

E.

TCP 47

 

Correct Answer: CD

 

 

 

 

QUESTION 865

Mike, a user, states that he is receiving several unwanted emails about home loans. Which of the following is this an example of?

 

A.

Spear phishing

B.

Hoaxes

C.

Spoofing

D.

Spam

 

Correct Answer: D

 

 

QUESTION 866

Which of the following must a user implement if they want to send a secret message to a coworker by embedding it within an image?

 

A.

Transport encryption

B.

Steganography

C.

Hashing

D.

Digital signature

 

Correct Answer: B

 

 

QUESTION 867

Pete, a network administrator, is implementing IPv6 in the DMZ. Which of the following protocols must he allow through the firewall to ensure the web servers can be reached via IPv6 from an IPv6 enabled Internet host?

 

A.

TCP port 443 and IP protocol 46

B.

TCP port 80 and TCP port 443

C.

TCP port 80 and ICMP

D.

TCP port 443 and SNMP

 

Correct Answer: C

 

 

QUESTION 868

Sara, a security technician, has received notice that a vendor coming in for a presentation will require access to a server outside of the network. Currently, users are only able to access remote sites through a VPN connection. How could Sara BEST accommodate the vendor?

 

A.

Allow incoming IPSec traffic into the vendor’s IP address.

B.

Set up a VPN account for the vendor, allowing access to the remote site.

C.

Turn off the firewall while the vendor is in the office, allowing access to the remote site.

D.

Write a firewall rule to allow the vendor to have access to the remote site.

 

Correct Answer: D

 

 

 

 

 

QUESTION 869

Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate laptops where the file structures are unknown?

 

A.

Folder encryption

B.

File encryption

C.

Whole disk encryption

D.

Steganography

 

Correct Answer: C

 

 

QUESTION 870

Encryption used by RADIUS is BEST described as:

 

A.

Quantum

B.

Elliptical curve

C.

Asymmetric

D.

Symmetric

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Practice Tests (February 2016) and tagged , , , , , , , . Bookmark the permalink.