PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.4)

Exam SY0-401: CompTIA Security+ Certification (update May 2nd, 2016)

Which of the following could she implement to add an additional factor of authorization?

Ann a network administrator has been tasked with strengthening the authentication of users
logging into systems in area containing sensitive information. Users log in with usernames and
passwords, following by a retinal scan. Which of the following could she implement to add an
additional factor of authorization?

Which of the following does this demonstrate?

A security manager installed a standalone fingerprint reader at the data center. All employees that

need to access the data center have been enrolled to the reader and local reader database is
always kept updates. When an employee who has been enrolled uses the fingerprint reader the
door to the data center opens. Which of the following does this demonstrate? (Select THREE)

Which of the following IP address/subnet mask combinations could be used to correctly configure a client machi

A network technician is configuring clients for VLAN access. The network address for the sales
department is 192.168.0.64 with a broadcast address of 192.168.0.71. Which of the following IP
address/subnet mask combinations could be used to correctly configure a client machine in the
sales department?

Which of the following would BEST assist in correcting this issue?

The help desk is experiencing a higher than normal amount of calls from users reporting slow
response from the application server. After analyzing the data from a packet capturing tool, the
head of the network engineering department determines that the issue is due, in part from the
increase of personnel recently hired to perform application development. Which of the following
would BEST assist in correcting this issue?

Which of the following should be the PRIMARY security considerations by the security managers at each organiza

Two organizations want to share sensitive data with one another from their IT systems to support
a mutual customer base. Both organizations currently have secure network and security policies
and procedures. Which of the following should be the PRIMARY security considerations by the
security managers at each organization prior to sharing information? (Select THREE)


Page 114 of 168« First...102030...112113114115116...120130140...Last »