PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.2)

Exam SY0-401: CompTIA Security+ Certification (update March 11th, 2015)

which of the following as a mitigation method against further attempts?

Joe analyzed the following log and determined the security team should implement which of
the following as a mitigation method against further attempts?
Host 192.168.1.123
[00: 00: 01]Successful Login: 015 192.168.1.123 : local
[00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124
[00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124
[00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124
[00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124

Which of the following is this an example of?

A computer supply company is located in a building with three wireless networks. The
system security team implemented a quarterly security scan and saw the following.
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following is this an example of?

which of the following should be accessible locally from every site to ensure users with bad certificates cann

A systems administrator has implemented PKI on a classified government network. In the
even0074 that a disconnect occurs from the primary CA, which of the following should be
accessible locally from every site to ensure users with bad certificates cannot gain access to
the network?

Which of the following sets of commands would meet this requirement?

Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can
be accessed using the same password. The company’s network device security policy
mandates that at least one virtual terminal have a different password than the other virtual
terminals. Which of the following sets of commands would meet this requirement?

Which of the following could the technician use to prepare the report?

Joe, an employee, was escorted from the company premises due to suspicion of revealing
trade secrets to a competitor. Joe had already been working for two hours before leaving the
premises. A security technician was asked to prepare a report of files that had changed
since last night’s integrity scan. Which of the following could the technician use to prepare
the report? (Select TWO).


Page 18 of 37« First...10...1617181920...30...Last »