PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.5)

Exam SY0-401: CompTIA Security+ Certification (update November 11th, 2016)

Which of the following reasons could have caused this port to be disabled?

A switch is set up to allow only 2 simultaneous MAC addresses per switch port. An administrator is
reviewing a log and determines that a switch ort has been deactivated in a conference room after it
detected 3 or more MAC addresses on the same port. Which of the following reasons could have caused
this port to be disabled?

Which of the following ciphers should be chosen?

a company is deploying an new video conferencing system to be used by the executive team for board
meetings. The security engineer has been asked to choose the strongest available asymmetric cipher to
be used for encryption of board papers, and chose the strongest available stream cipher to be configured
for video streaming. Which of the following ciphers should be chosen? (Select two)

Which of the following best describes the incorporation of these elements?

Joe has hired several new security administrators and have been explaining the4 design of the company’s
network. He has described the position and descriptions of the company’s firewalls, IDS sensors, antivirus
server, DMZs, and HIPS. Which of the following best describes the incorporation of these elements?

Which of the following represents the MOST relevant technical security criteria for the MDM?

A security administrator is selecting an MDM solution for an organization, which has strict security
requirements for the confidentiality of its data on end user devices. The organization decides to allow
BYOD, but requires that users wishing to participate agree to the following specific device configurations;
camera disablement, password enforcement, and application whitelisting. The organization must be able
to support a device portfolio of differing mobile operating systems. Which of the following represents the
MOST relevant technical security criteria for the MDM?

A security administrator suspects that the users are the targets of:

Employees are reporting that they have been receiving a large number of emails advertising products and
services. Links in the email direct the users’ browsers to the websites for the items being offered. No
reports of increased virus activity have been observed. A security administrator suspects that the users
are the targets of:

Which of the following controls would be MOST appropriate in this scenario?

A chief information officer (CIO) is concerned about PII contained in the organization’s various data
warehouse platforms. Since not all of the PII transferred to the organization is required for proper
operation of the data warehouse application, the CIO requests the in needed PII data be parsed and
securely discarded. Which of the following controls would be MOST appropriate in this scenario?


Page 154 of 178« First...102030...152153154155156...160170...Last »