[Free] Download New Updated (February 2016) CompTIA SY0-401 Practice Tests 981-990

Ensurepass

QUESTION 981

Which of the following explains the difference between a public key and a private key?

 

A.

The public key is only used by the client while the private key is available to all.

Both keys are mathematically related.

B.

The private key only decrypts the data while the public key only encrypts the data.

Both keys are mathematically related.

C.

The private key is commonly used in symmetric key decryption while the public key is used in asymmetric key decryption.

D.

The private key is only used by the client and kept secret while the public key is available to all.

 

Correct Answer: D

 

 

QUESTION 982

Requiring technicians to report spyware infections is a step in which of the following?

 

A.

Routine audits

B.

Change management

C.

Incident management

D.

Clean desk policy

 

Correct Answer: C

 

 

QUESTION 983

An organization is recovering data following a datacenter outage and determines that backup copies of files containing personal information were stored in an unsecure location, because the sensitivity was unknown. Which of the following activities should occur to prevent this in the future?

 

A.

Business continuity planning

B.

Quantitative assessment

C.

Data classification

D.

Qualitative assessment

 

Correct Answer: C

 

 

QUESTION 984

Which of the following provides the LEAST availability?

 

A.

RAID 0

B.

RAID 1

C.

RAID 3

D.

RAID 5

 

Correct Answer: A

 

 

 

 

 

QUESTION 985

FTP/S uses which of the following TCP ports by default?

 

A.

20 and 21

B.

139 and 445

C.

443 and 22

D.

989 and 990

 

Correct Answer: D

 

 

QUESTION 986

Which of the following is mainly used for remote access into the network?

 

A.

XTACACS

B.

TACACS+

C.

Kerberos

D.

RADIUS

 

Correct Answer: D

 

 

QUESTION 987

Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table?

 

A.

Full disk

B.

Individual files

C.

Database

D.

Removable media

 

Correct Answer: C

 

 

QUESTION 988

Several users’ computers are no longer responding normally and sending out spam email to the users’ entire contact list. This is an example of which of the following?

 

A.

Trojan virus

B.

Botnet

C.

Worm outbreak

D.

Logic bomb

 

Correct Answer: C

 

 

QUESTION 989

Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to the building. Sara then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the following attacks occurred LAST?

 

A.

Phishing

B.

Shoulder surfing

C.

Impersonation

D.

Tailgating

 

Correct Answer: C

 

 

QUESTION 990

A company replaces a number of devices with a mobile appliance, combining several functions. Which of the following descriptions fits this new implementation? (Select TWO).

 

A.

Cloud computing

B.

Virtualization

C.

All-in-one device

D.

Load balancing

E.

Single point of failure

 

Correct Answer: CE

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized and tagged , , , , , , , . Bookmark the permalink.