[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 871-880

Ensurepass

QUESTION 871

Which of the following is used by the recipient of a digitally signed email to verify the identity of the sender?

 

A.

Recipient’s private key

B.

Sender’s public key

C.

Recipient’s public key

D.

Sender’s private key

 

Correct Answer: B

 

 

QUESTION 872

A security analyst has been tasked with securing a guest wireless network. The
y recommend the company use an authentication server but are told the funds are not available to set this up. Which of the following BEST allows the analyst to restrict user access to approved devices?

 

A.

Antenna placement

B.

Power level adjustment

C.

Disable SSID broadcasting

D.

MAC filtering

 

Correct Answer: D

 

 

 

 

 

 

 

QUESTION 873

A supervisor in the human resources department has been given additional job duties in the accounting department. Part of their new duties will be to check the daily balance sheet calculations on spreadsheets that are restricted to the accounting group. In which of the following ways should the account be handled?

 

A.

The supervisor should be allowed to have access to the spreadsheet files, and their membership in the human resources group should be terminated.

B.

The supervisor should be removed from the human resources group and added to the accounting group.

C.

The supervisor should be added to the accounting group while maintaining their membership in the human resources group.

D.

The supervisor should only maintain membership in the human resources group.

 

Correct Answer: C

 

 

QUESTION 874

Which of the following security benefits would be gained by disabling a terminated user account rather than deleting it?

 

A.

Retention of user keys

B.

Increased logging on access attempts

C.

Retention of user directories and files

D.

Access to quarantined files

 

Correct Answer: A

 

 

QUESTION 875

Which of the following security architecture elements also has sniffer functionality? (Select TWO).

 

A.

HSM

B.

IPS

C.

SSL accelerator

D.

WAP

E.

IDS

 

Correct Answer: BE

 

 

QUESTION 876

Jane, an IT security technician, needs to create a way to secure company mobile devices. Which of the following BEST meets this need?

 

A.

Implement voice encryption, pop-up blockers, and host-based firewalls.

B.

Implement firewalls, network access control, and strong passwords.

C.

Implement screen locks, device encryption, and remote wipe capabilities.

D.

Implement application patch management, antivirus, and locking cabinets.

 

Correct Answer: C

 

 

QUESTION 877

Which of the following should a security technician implement to identify untrusted certificates?

 

A.

CA

B.

PKI

C.

CRL

D.

Recovery agent

 

Correct Answer: C

 

 

QUESTION 878

Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a certificate?

 

A.

Certification authority

B.

Key escrow

C.

Certificate revocation list

D.

Registration authority

 

Correct Answer: A

 

 

QUESTION 879

Sara, a security engineer, is testing encryption ciphers for performance. Which of the following ciphers offers strong encryption with the FASTEST speed?

 

A.

3DES

B.

Blowfish

C.

Serpent

D.

AES256

 

Correct Answer: B

 

 

QUESTION 880

Which of the following is an authentication method that can be secured by using SSL?

 

A.

RADIUS

B.

LDAP

C.

TACACS+

D.

Kerberos

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized and tagged , , , , , , , . Bookmark the permalink.