PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.5)

Exam SY0-401: CompTIA Security+ Certification (update November 11th, 2016)

Which of the following is this attack called?

Joe a system administrator receives reports that users attempting to reach the corporate website are
arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the name
server log has several corporate IP addresses that were changed using Joe’s credentials. Which of the
following is this attack called?

which of the following?

An employee attempts to go to a well-known bank site using the company-standard web browser by
correctly typing in the address of the site into the web browser. The employee is directed to a website
that looks like the bank’s site but is not the actual bank site. The employee’s user name and password are
subsequently stolen. This is an example of which of the following?

Which of the following authentication types has been utilized?

A user authenticates to a local directory server. The user then opens a virtualization client to connect to a
virtual server. Instead of supplying a username/password combination, the user simply checks a use
directory credentials checkbox to authenticate to the virtual server. Which of the following authentication
types has been utilized?

Which of the following security controls did the Chief Security Officer implement to BEST meet these requireme

The new Chief Information Officer (CIO) of company ABC, Joe has noticed that company XWY is always
one step ahead with similar products. He tasked his Chief Security Officer to implement new security
controls to ensure confidentiality of company ABC’s proprietary data and complete accountability for all
data transfers. Which of the following security controls did the Chief Security Officer implement to BEST
meet these requirements? (Select Two)


Page 129 of 178« First...102030...127128129130131...140150160...Last »