PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.4)

Exam SY0-401: CompTIA Security+ Certification (update May 2nd, 2016)

Which of the following configuration commands should be implemented to enforce this requirement?

A security administrator is tasked with implementing centralized management of all network
devices. Network administrators will be required to logon to network devices using their LDAP
credentials. All command executed by network administrators on network devices must fall within
a preset list of authorized commands and must be logged to a central facility. Which of the
following configuration commands should be implemented to enforce this requirement?

Which of the following methods has MOST likely been used?

A website administrator has received an alert from an application designed to check the integrity of
the company’s website. The alert indicated that the hash value for a particular MPEG file has
changed. Upon further investigation, the media appears to be the same as it was before the alert.
Which of the following methods has MOST likely been used?

This is because the encryption scheme in use adheres to:

An attacker captures the encrypted communication between two parties for a week, but is unable
to decrypt the messages. The attacker then compromises the session key during one exchange
and successfully compromises a single message. The attacker plans to use this key to decrypt
previously captured and future communications, but is unable to. This is because the encryption
scheme in use adheres to:

hown below: From IT department To employee Subject email quota exceeded Pease click on the following link http

Many employees are receiving email messages similar to the one shown below:
From IT department
To employee
Subject email quota exceeded
Pease click on the following link http:www.website.info/email.php?quota=1Gb and provide your
username and password to increase your email quota. Upon reviewing other similar emails, the
security administrator realized that all the phishing URLs have the following common elements;
they all use HTTP, they all come from .info domains, and they all contain the same URI.
Which of the following should the security administrator configure on the corporate content filter to
prevent users from accessing the phishing URL, while at the same time minimizing false
positives?

Which of the following ACLs provides the BEST protection against the above attack and any further attacks from

A security analyst is reviewing the following packet capture of an attack directed at a company’s
server located in the DMZ:

Which of the following ACLs provides the BEST protection against the above attack and any
further attacks from the same IP, while minimizing service interruption?

Which of the following security-related trainings could have made Ann aware of the repercussions of her action

Ann, a college professor, was recently reprimanded for posting disparaging remarks re-grading
her coworkers on a web site. Ann stated that she was not aware that the public was able to view
her remakes. Which of the following security-related trainings could have made Ann aware of the
repercussions of her actions?


Page 159 of 168« First...102030...157158159160161...Last »