[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 891-900

Ensurepass

QUESTION 891

XYZ Corporation is about to purchase another company to expand its operations. The CEO is concerned about information leaking out, especially with the cleaning crew that comes in at night. The CEO would like to ensure no paper files are leaked. Which of the following is the BEST policy to implement?

 

A.

Social media policy

B.

Data retention policy

C.

CCTV policy

D.

Clean desk policy

 

Correct Answer: D

 

 

QUESTION 892

In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization?

 

A.

Supervisor

B.

Administrator

C.

Root

D.

Director

 

Correct Answer: B

 

 

QUESTION 893

Which of the following is the process in which a law enforcement officer or a government agent encourages or induces a person to commit a crime when the potential criminal expresses a desire not to go ahead?

 

A.

Enticement

B.

Entrapment

C.

Deceit

D.

Sting

 

Correct Answer: B

 

 

QUESTION 894

Which of the following types of logs could provide clues that someone has been attempting to compromise the SQL Server database?

 

A.

Event

B.

SQL_LOG

C.

Security

D.

Access

 

Correct Answer: A

 

 

QUESTION 895

Pete, the system administrator, has concerns regarding users losing their company provided smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his concerns?

 

A.

Enforce device passwords.

B.

Use remote sanitation.

C.

Enable GPS tracking.

D.

Encrypt stored data.

 

Correct Answer: C

 

 

QUESTION 896

A security administrator wants to deploy security controls to mitigate the threat of company employees’ personal information being captured online. Which of the following would BEST serve this purpose?

 

A.

Anti-spyware

B.

Antivirus

C.

Host-based firewall

D.

Web content filter

 

Correct Answer: A

 

 

QUESTION 897

Which of the following statements is MOST likely to be included in the security awareness training about P2P?

 

A.

P2P is always used to download copyrighted material.

B.

P2P can be used to improve computer system response.

C.

P2P may prevent viruses from entering the network.

D.

P2P may cause excessive network bandwidth.

 

Correct Answer: D

 

 

QUESTION 898

A company’s chief information officer (CIO) has analyzed the financial loss associated with the company’s database breach. They calculated that one single breach could cost the company $1,000,000 at a minimum. Which of the following documents is the CIO MOST likely updating?

 

A.

Succession plan

B.

Continuity of operation plan

C.

Disaster recovery plan

D.

Business impact analysis

 

Correct Answer: D

 

 

QUESTION 899

After a production outage, which of the following documents contains detailed information on the order in which the system should be restored to service?

 

A.

Succession planning

B.

Disaster recovery plan

C.

Information security plan

D.

Business impact analysis

 

Correct Answer: B

 

 

QUESTION 900

Which of the following wireless protocols could be vulnerable to a brute-force password attack? (Select TWO).

 

A.

WPA2-PSK

B.

WPA – EAP – TLS

C.

WPA2-CCMP

D.

WPA -CCMP

E.

WPA – LEAP

F.

WEP

 

Correct Answer: AE

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized and tagged , , , , , , , . Bookmark the permalink.