Pass4Test의 CompTIA SY0-401 (CompTIA Security+ Certification)덤프공부가이드에는 CompTIA SY0-401 (CompTIA Security+ Certification)시험의 가장 최신 시험문제의 기출문제와 예상문제가 정리되어 있어 CompTIA SY0-401 (CompTIA Security+ Certification)시험을 패스하는데 좋은 동반자로 되어드립니다. CompTIA SY0-401 (CompTIA Security+ Certification)시험에서 떨어지는 경우 CompTIA SY0-401 (CompTIA Security+ Certification)덤프비용전액 환불신청을 할수 있기에 보장성이 있습니다.시험적중율이 떨어지는 경우 덤프를 빌려 공부한 것과 같기에 부담없이 덤프를 구매하셔도 됩니다.
NO.1 A software firm posts patches and updates to a publicly accessible FTP
site. The software firm
also posts digitally signed checksums of all patches
and updates. The firm does this to address:
A. Integrity of downloaded
software.
B. Availability of the FTP site.
C. Confidentiality of
downloaded software.
D. Integrity of the server logs.
Answer:
A
NO.2 Due to limited resources, a company must reduce their hardware
budget while still maintaining
availability. Which of the following would
MOST likely help them achieve their objectives?
A. Virtualization
B.
Remote access
C. Network access control
D. Blade servers
Answer:
A
NO.3 Which of the following wireless security technologies continuously
supplies new keys for
WEP?
A. TKIP
B. Mac filtering
C. WPA2
D.
WPA
Answer: A
NO.4 Users report that they are unable to access network
printing services. The security technician
checks the router access list and
sees that web, email, and secure shell are allowed. Which of the
following is
blocking network printing?
A. Port security
B. Flood guards
C. Loop
protection
D. Implicit deny
Answer: D
NO.5 Which of the following
components MUST be trusted by all parties in PKI?
A. Key escrow
B.
CA
C. Private key
D. Recovery key
Answer: B
NO.6 A company uses
PGP to ensure that sensitive email is protected. Which of the following
types
of cryptography is being used here for the key exchange?
A.
Symmetric
B. Session-based
C. Hashing
D. Asymmetric
Answer:
A
NO.7 Which of the following tools will allow a technician to detect
security-related TCP connection
anomalies?
A. Logical token
B.
Performance monitor
C. Public key infrastructure
D. Trusted platform
module
Answer: B
NO.8 An administrator has a network subnet dedicated
to a group of users. Due to concerns
regarding data and network security, the
administrator desires to provide network access for this
group only. Which of
the following would BEST address this desire?
A. Install a proxy server
between the users' computers and the switch to filter inbound
network
traffic.
B. Block commonly used ports and forward them to higher
and unused port numbers.
C. Configure the switch to allow only traffic from
computers based upon their physical address.
D. Install host-based intrusion
detection software to monitor incoming DHCP Discover
requests.
Answer:
C
site. The software firm
also posts digitally signed checksums of all patches
and updates. The firm does this to address:
A. Integrity of downloaded
software.
B. Availability of the FTP site.
C. Confidentiality of
downloaded software.
D. Integrity of the server logs.
Answer:
A
NO.2 Due to limited resources, a company must reduce their hardware
budget while still maintaining
availability. Which of the following would
MOST likely help them achieve their objectives?
A. Virtualization
B.
Remote access
C. Network access control
D. Blade servers
Answer:
A
NO.3 Which of the following wireless security technologies continuously
supplies new keys for
WEP?
A. TKIP
B. Mac filtering
C. WPA2
D.
WPA
Answer: A
NO.4 Users report that they are unable to access network
printing services. The security technician
checks the router access list and
sees that web, email, and secure shell are allowed. Which of the
following is
blocking network printing?
A. Port security
B. Flood guards
C. Loop
protection
D. Implicit deny
Answer: D
NO.5 Which of the following
components MUST be trusted by all parties in PKI?
A. Key escrow
B.
CA
C. Private key
D. Recovery key
Answer: B
NO.6 A company uses
PGP to ensure that sensitive email is protected. Which of the following
types
of cryptography is being used here for the key exchange?
A.
Symmetric
B. Session-based
C. Hashing
D. Asymmetric
Answer:
A
NO.7 Which of the following tools will allow a technician to detect
security-related TCP connection
anomalies?
A. Logical token
B.
Performance monitor
C. Public key infrastructure
D. Trusted platform
module
Answer: B
NO.8 An administrator has a network subnet dedicated
to a group of users. Due to concerns
regarding data and network security, the
administrator desires to provide network access for this
group only. Which of
the following would BEST address this desire?
A. Install a proxy server
between the users' computers and the switch to filter inbound
network
traffic.
B. Block commonly used ports and forward them to higher
and unused port numbers.
C. Configure the switch to allow only traffic from
computers based upon their physical address.
D. Install host-based intrusion
detection software to monitor incoming DHCP Discover
requests.
Answer:
C