PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.5)

Exam SY0-401: CompTIA Security+ Certification (update November 11th, 2016)

Which of the following protocols should be used to this?

Joe, the chief technical officer (CTO) is concerned that the servers and network devices may not be able
to handle the growing needs of the company. He has asked his network engineer to being monitoring the
performance of these devices and present statistics to management for capacity planning. Which of the
following protocols should be used to this?

Which of the following device attributes was used to determine that the device was unauthorized?

A security administrator is responsible for ensuring that there are no unauthorized devices utilizing the
corporate network. During a routine scan, the security administrator discovers an unauthorized device
belonging to a user in the marketing department. The user is using an android phone in order to browse
websites. Which of the following device attributes was used to determine that the device was
unauthorized?

Which of the following will allow Joe to configure a certificate for the firewall…?

Joe, a security technician, is configuring two new firewalls through the web on each. Each time Joe
connects, there is a warning message in the browser window about the certificate being untrusted.Which of the following will allow Joe to configure a certificate for the firewall so that firewall
administrators are able to connect both firewalls without experiencing the warning message?


Page 145 of 178« First...102030...143144145146147...150160170...Last »