Pass4sure SY0-401 Dumps With Real Questions & Practice Test

Transcription

CompTIASY0-401CompTIA Security 1

QUESTION: 375Which of the following is another, more common, name for EAPOL?A. LDAPB. 802.1XC. LDAPSD. 802.12Answer: BQUESTION: 376If you don't know the MAC address of a Windows-based machine, what command-lineutility can you use to ascertain it?A. macconfigB. ifconfigC. ipconfigD. configAnswer: CQUESTION: 377In the Windows world, what tool is used to disable a port?A. System ManagerB. System MonitorC. Performance MonitorD. Windows FirewallAnswer: DQUESTION: 378A set of standardized system images with a pre-defined set of applications is used tobuild enduser workstations. The security administrator has scanned every workstation to

create a current inventory of all applications that are installed on active workstations andis documenting which applications are out-of-date and could be exploited. The securityadministrator is determining the:A. Attack surface.B. Application hardening effectiveness.C. Application baseline.D. OS hardening effectiveness.Answer: AQUESTION: 379A perimeter survey finds that the wireless network within a facility is easily reachableoutside of the physical perimeter. Which of the following should be adjusted to mitigatethis risk?A. CCMPB. MAC filterC. SSID broadcastD. Power level controlsAnswer: DQUESTION: 380Which of the following would verify that a threat does exist and security controls caneasily be bypassed without actively testing an application?A. Protocol analyzerB. Vulnerability scanC. Penetration testD. Port scannerAnswer: BQUESTION: 381An administrator values transport security strength above network speed whenimplementing an SSL VPN. Which of the following encryption ciphers would BEST

meet their needs?A. SHA256B. RC4C. 3DESD. AES128Answer: DQUESTION: 382All of the following are encryption types EXCEPT:A. Full diskB. SMIMEC. File and folderD. RADIUSAnswer: DQUESTION: 383Which of the following is used by Matt, a security administrator, to lower the risksassociated with electrostatic discharge, corrosion, and thermal breakdown?A. Temperature and humidity controlsB. Routine auditsC. Fire suppression and EMI shieldingD. Hot and cold aislesAnswer: AQUESTION: 384When integrating source material from an open source project into a highly secureenvironment, which of the following precautions should prevent hidden threats?A. Design reviewB. Code review

C. Risk assessmentD. Vulnerability scanAnswer: BQUESTION: 385Which of the following would MOST likely belong in the DMZ? (Select TWO).A. Finance serversB. Backup serversC. Web serversD. SMTP gatewaysE. LaptopsAnswer: C, DQUESTION: 386When verifying file integrity on a remote system that is bandwidth limited, which of thefollowing tool combinations provides the STRONGEST confidence?A. MD5 and 3DESB. MD5 and SHA-1C. SHA-256 and RSAD. SHA-256 and AESAnswer: B

For More exams visit https://killexams.com Kill your exam at First Attempt.Guaranteed!

Pass4sure SY0-401 Real Test Questions, Exam Simulator and Study Guides Keywords: pass4sure SY0-401, SY0-401 dumps, SY0-401 real questions, SY0-401 Question bank, SY0-401 braindumps, SY0-401 questions and answers, SY0-401 Q&A, SY0-401 vce, free SY0-401 download, SY0-401 vce, Free SY0-401 vce, Download Free SY0-401