PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.7)

Briefing SY0-401: CompTIA Security+ (update October 21th, 2017)

Which of the following actions should Joe recommend?

Joe, a technician at the local power plant, notices that several turbines had ramped up in cycles during the
week. Further investigation by the system engineering team determined that a timed .exe file had been
uploaded to the system control console during a visit by international contractors.
Which of the following actions should Joe recommend?

Configure the firewall to allow these three rules…

SIMULATION
Task: Configure the firewall (fill out the table) to allow these three rules:
1. Only allow the accounting computer to have HTTPS access to the Administrative server.
2. Only allow the HT computer to be able to communicate with the Server2 System over SCP.
3. Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2

Click on the firewall and configure it to allow ONLY…

HOTSPOT
The security administrator has installed a new firewall which implements an implicit DENY policy by default.
Click on the firewall and configure it to allow ONLY the following communication.
1. The Accounting workstation can ONLY access the web server on the public network over the default
HTTPS port. The accounting workstation should not access other networks.
2. The HR workstation should be restricted to communicate with the Financial server ONLY, over the default
SCP port
3. The Admin workstation should ONLY be able to access the servers on the secure network over the default
TFTP port.Instructions: The firewall will process the rules in a top-down manner in order as a first match The port
number must be typed in and only one port number can be entered per rule. Type ANY for all ports. The original
firewall configuration can be reset at any time by pressing the reset button. Once you have met the simulation
requirements, click save and then Done to submit.

Hot Area:

Which of the following should be implemented to secure …

A company has proprietary mission critical devices connected to their network which are configured remotely by
both employees and approved customers. The administrator wants to monitor device security without changing
their baseline configuration. Which of the following should be implemented to secure the devices without risking
availability?


Page 175 of 178« First...102030...173174175176177...Last »