PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.4)

Exam SY0-401: CompTIA Security+ Certification (update May 2nd, 2016)

Which of the following controls can further secure the data in the central storage system?

An organization must implement controls to protect the confidentiality of its most sensitive data.
The company is currently using a central storage system and group based access control for its
sensitive information. Which of the following controls can further secure the data in the central
storage system?

Which of the following does he need to estimate NEXT in order to complete his risk calculations?

Joe, the information security manager, is tasked with calculating risk and selecting controls to
protect a new system. He has identified people, environmental conditions, and events that could
affect the new system. Which of the following does he need to estimate NEXT in order to complete
his risk calculations?

Which of the following is the MOST likely reason for the incident?

A network administrator identifies sensitive files being transferred from a workstation in the LAN to
an unauthorized outside IP address in a foreign country. An investigation determines that the
firewall has not been altered, and antivirus is up-to-date on the workstation. Which of the following
is the MOST likely reason for the incident?

Which of the following types of malware is the laptop MOST likely infected with?

After working on his doctoral dissertation for two years, Joe, a user, is unable to open his
dissertation file. The screen shows a warning that the dissertation file is corrupted because it is
infected with a backdoor, and can only be recovered by upgrading the antivirus software from the
free version to the commercial version. Which of the following types of malware is the laptop
MOST likely infected with?

Which of the following is the reason the malicious user is able to intercept and see the clear text communicat

An employee connects a wireless access point to the only jack in the conference room to provide
Internet access during a meeting. The access point is configured to use WPA2-TKIP. A malicious
user is able to intercept clear text HTTP communication between the meeting attendees and the
Internet. Which of the following is the reason the malicious user is able to intercept and see the
clear text communication?


Page 72 of 168« First...102030...7071727374...8090100...Last »