PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.4)

Exam SY0-401: CompTIA Security+ Certification (update May 2nd, 2016)

Which of the following controls can be implemented to prevent such unauthorized changes in the future?

The internal audit group discovered that unauthorized users are making unapproved changes to
various system configuration settings. This issue occurs when previously authorized users transfer
from one department to another and maintain the same credentials. Which of the following
controls can be implemented to prevent such unauthorized changes in the future?

Which of the following protocols should be used to this?

Joe, the chief technical officer (CTO) is concerned that the servers and network devices may not
be able to handle the growing needs of the company. He has asked his network engineer to being
monitoring the performance of these devices and present statistics to management for capacity
planning. Which of the following protocols should be used to this?

Which of the following device attributes was used to determine that the device was unauthorized?

A security administrator is responsible for ensuring that there are no unauthorized devices utilizing
the corporate network. During a routine scan, the security administrator discovers an unauthorized
device belonging to a user in the marketing department. The user is using an android phone in
order to browse websites. Which of the following device attributes was used to determine that the
device was unauthorized?


Page 138 of 168« First...102030...136137138139140...150160...Last »