근 몇년간IT산업이 전례없이 신속히 발전하여 IT업계에 종사하는 분들이 여느때보다 많습니다. 경쟁이 이와같이 치열한 환경속에서 누구도 대체할수 없는 자기만의 자리를 찾으려면 IT인증자격증취득은 무조건 해야 하는것이 아닌가 싶습니다. CompTIA SY0-401 (CompTIA Security+ Certification) 시험은 IT인증시험중 가장 인기있는 시험입니다. Pass4Test에서는 여러분이 CompTIA SY0-401 (CompTIA Security+ Certification) 시험을 한방에 패스하도록 실제시험문제에 대비한 CompTIA SY0-401 (CompTIA Security+ Certification) 덤프를 발췌하여 저렴한 가격에 제공해드립니다.시험패스 못할시 덤프비용은 환불처리 해드리기에 고객님께 아무런 페를 끼치지 않을것입니다.
NO.1 Jane has recently implemented a new network design at her organization and wishes to
passively identify security issues with the new network. Which of the following should Jane perform?
A. Vulnerability assessment
B. Black box testing
C. White box testing
D. Penetration testing
Answer: A
NO.2 Pete, a developer, writes an application. Jane, the security analyst, knows some things about
the overall application but does not have all the details. Jane needs to review the software before it
is released to production. Which of the following reviews should Jane conduct?
A. Gray Box Testing
B. Black Box Testing
C. Business Impact Analysis
D. White Box Testing
Answer: A
NO.3 Pete needs to open ports on the firewall to allow for secure transmission of files. Which of
the following ports should be opened on the firewall?
A. TCP 23
B. UDP 69
C. TCP 22
D. TCP 21
Answer: C
NO.4 In the initial stages of an incident response, Matt, the security administrator, was provided
the hard drives in question from the incident manager. Which of the following incident response
procedures would he need to perform in order to begin the analysis? (Select TWO).
A. Take hashes
B. Begin the chain of custody paperwork
C. Take screen shots
D. Capture the system image
E. Decompile suspicious files
Answer: A,D
NO.5 Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?
A. Dumpster diving
B. War driving
C. Tailgating
D. War chalking
Answer: A
NO.6 Which of the following assessments would Pete, the security administrator, use to actively test
that an application's security controls are in place?
A. Code review
B. Penetration test
C. Protocol analyzer
D. Vulnerability scan
Answer: B
NO.7 Mike, a network administrator, has been asked to passively monitor network traffic to the
company's sales websites. Which of the following would be BEST suited for this task?
A. HIDS
B. Firewall
C. NIPS
D. Spam filter
Answer: C
NO.8 Configuring the mode, encryption methods, and security associations are part of which of the
following?
A. IPSec
B. Full disk encryption
C. 802.1x
D. PKI
Answer: A