Free Download New Updated CompTIA Security+ SY0-401 Real Exam Questions and Answers 301-310

Ensurepass

QUESTION 301

Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?

 

A.

Identify user habits

B.

Disconnect system from network

C.

Capture system image

D.

Interview witnesses

 

Correct Answer: C

 

 

QUESTION 302

Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point?

 

A.

Placement of antenna

B.

Disabling the SSID

C.

Implementing WPA2

D.

Enabling the MAC filtering

 

Correct Answer: A

 

 

QUESTION 303

Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?

 

A.

Implement WPA

B.

Disable SSID

C.

Adjust antenna placement

D.

Implement WEP

 

Correct Answer: A

 

 

QUESTION 304

Which of the following is a management control?

 

A.

Logon banners

B.

Written security policy

C.

SYN attack prevention

D.

Access Control List (ACL)

 

Correct Answer: B

 

 

QUESTION 305

Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?

 

A.

Restoration and recovery strategies

B.

Deterrent strategies

C.

Containment strategies

D.

Detection strategies

 

Correct Answer: C

 

 

QUESTION 306

In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using?

 

A.

Three factor

B.

Single factor

C.

Two factor

D.

Four factor

 

Correct Answer: B

 

 

QUESTION 307

Using proximity card readers instead of the traditional key punch doors would help to mitigate:

 

A.

Impersonation

B.

Tailgating

C.

Dumpster diving

D.

Shoulder surfing

 

Correct Answer: D

 

 

QUESTION 308

Which of the following application attacks is used to gain access to SEH?

 

A.

Cookie stealing

B.

Buffer overflow

C.

Directory traversal

D.

XML injection

 

Correct Answer: B

 

 

QUESTION 309

Which of the following is an authentication service that uses UDP as a transport medium?

 

A.

TACACS+

B.

LDAP

C.

Kerberos

D.

RADIUS

 

Correct Answer: D

 

 

QUESTION 310

Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).

 

A.

Tethering

B.

Screen lock PIN

C.

Remote wipe

D.

Email password

E.

GPS tracking

F.

Device encryption

 

Correct Answer: CF

 

Instant Access to Download Latest Complete Collection of CompTIA SY0-401 Real Exam

Try CompTIA SY0-401 Free Demo