PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.5)

Exam SY0-401: CompTIA Security+ Certification (update November 11th, 2016)

Which of the following should the engineer do to harden the network from this type of intrusion in the future?

A network security engineer notices unusual traffic on the network from a single IP attempting to access
systems on port 23. Port 23 is not used anywhere on the network. Which of the following should the
engineer do to harden the network from this type of intrusion in the future?

Which of the following is the BEST policy to implement under these circumstances?

A company is starting to allow employees to use their own personal without centralized management.
Employees must contract IT to have their devices configured to use corporate email; access is also
available to the corporate cloud-based services. Which of the following is the BEST policy to implement
under these circumstances?

Which of the following tools or techniques did the help desk use to avoid losing the data on the laptop?

One of the senior managers at a company called the help desk to report to report a problem. The
manager could no longer access data on a laptop equipped with FDE. The manager requested that the
FDE be removed and the laptop restored from a backup. The help desk informed the manager that the
recommended solution was to decrypt the hard drive prior to reinstallation and recovery. The senior
manager did not have a copy of the private key associated with the FDE on the laptop. Which of the
following tools or techniques did the help desk use to avoid losing the data on the laptop?

Which of the following principles BEST describes why this social engineering ploy was successful?

An employee in the accounting department recently received a phishing email that instructed them to
click a link in the email to view an important message from the IRS which threatened penalties if a
response was not received by the end of the business day. The employee clicked on the link and the
machine was infected with malware. Which of the following principles BEST describes why this social
engineering ploy was successful?

Which of the following compensating controls can the security technician to mitigate the security risk of a se

A security technician received notification of a remotely exploitable vulnerability affecting all
multifunction printers firmware installed throughout the organization. The vulnerability allows a malicious
user to review all the documents processed by the affected printers. Which of the following
compensating controls can the security technician to mitigate the security risk of a sensitive document
leak?


Page 118 of 178« First...102030...116117118119120...130140150...Last »