PrepAway - Latest Free Exam Questions & Answers

Category: SY0-301

Exam SY0-301: CompTIA Security+

Which of the following assessment types should the security administrator also take into consideration while e

A new enterprise solution is currently being evaluated due to its potential to increase the company’s profit margins. The security administrator has been asked to review its security implications. While evaluating the product, various vulnerability scans were performed. It was determined that the product is not a threat but has the potential to introduce additional vulnerabilities. Which of the following assessment types should the security administrator also take into consideration while evaluating this product?

Which of the following describes this form of authentication?

In order to access the network, an employee must swipe their finger on a device. Which of the following describes this form of authentication?

Which of the following methods of access, authentication, and authorization is the MOST secure by default?

Which of the following methods of access, authentication, and authorization is the MOST secure by default?

A Human Resource manager is assigning access to users in their specific department performing the same job fun

A Human Resource manager is assigning access to users in their specific department performing the same job function. This is an example of:

Which of the following tools provides the ability to determine if an application is transmitting a password in

Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?

NTLM is an improved and substantially backwards compatible replacement for which of the following?

NTLM is an improved and substantially backwards compatible replacement for which of the following?

Which of the following BEST describes this type of malware?

A user downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?


Page 12 of 22« First...1011121314...20...Last »