IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CompTIA SY0-401 (CompTIA Security+ Certification)인증덤프




Pass4Test의  CompTIA SY0-401 (CompTIA Security+ Certification)덤프공부가이드에는 CompTIA SY0-401 (CompTIA Security+ Certification)시험의 가장 최신 시험문제의 기출문제와 예상문제가 정리되어 있어  CompTIA SY0-401 (CompTIA Security+ Certification)시험을 패스하는데 좋은 동반자로 되어드립니다. CompTIA SY0-401 (CompTIA Security+ Certification)시험에서 떨어지는 경우  CompTIA SY0-401 (CompTIA Security+ Certification)덤프비용전액 환불신청을 할수 있기에 보장성이 있습니다.시험적중율이 떨어지는 경우 덤프를 빌려 공부한 것과 같기에 부담없이 덤프를 구매하셔도 됩니다.







NO.1 A software firm posts patches and updates to a publicly accessible FTP
site. The software firm

also posts digitally signed checksums of all patches
and updates. The firm does this to address:

A. Integrity of downloaded
software.

B. Availability of the FTP site.

C. Confidentiality of
downloaded software.

D. Integrity of the server logs.

Answer:
A



NO.2 Due to limited resources, a company must reduce their hardware
budget while still maintaining

availability. Which of the following would
MOST likely help them achieve their objectives?

A. Virtualization

B.
Remote access

C. Network access control

D. Blade servers

Answer:
A



NO.3 Which of the following wireless security technologies continuously
supplies new keys for

WEP?

A. TKIP

B. Mac filtering

C. WPA2

D.
WPA

Answer: A



NO.4 Users report that they are unable to access network
printing services. The security technician

checks the router access list and
sees that web, email, and secure shell are allowed. Which of the

following is
blocking network printing?

A. Port security

B. Flood guards

C. Loop
protection

D. Implicit deny

Answer: D



NO.5 Which of the following
components MUST be trusted by all parties in PKI?

A. Key escrow

B.
CA

C. Private key

D. Recovery key

Answer: B



NO.6 A company uses
PGP to ensure that sensitive email is protected. Which of the following
types

of cryptography is being used here for the key exchange?

A.
Symmetric

B. Session-based

C. Hashing

D. Asymmetric

Answer:
A



NO.7 Which of the following tools will allow a technician to detect
security-related TCP connection

anomalies?

A. Logical token

B.
Performance monitor

C. Public key infrastructure

D. Trusted platform
module

Answer: B



NO.8 An administrator has a network subnet dedicated
to a group of users. Due to concerns

regarding data and network security, the
administrator desires to provide network access for this

group only. Which of
the following would BEST address this desire?

A. Install a proxy server
between the users' computers and the switch to filter inbound
network

traffic.

B. Block commonly used ports and forward them to higher
and unused port numbers.

C. Configure the switch to allow only traffic from
computers based upon their physical address.

D. Install host-based intrusion
detection software to monitor incoming DHCP Discover

requests.

Answer:
C



Posted 2015/1/13 11:04:37  |  Category: CompTIA  |  Tag: SY0-401 인증덤프