PrepAway - Latest Free Exam Questions & Answers

Category: SY0-401 (v.5)

Exam SY0-401: CompTIA Security+ Certification (update November 11th, 2016)

Which of the following technical modifications to the architecture and corresponding security controls should

The Chief Security Officer (CISO) at a multinational banking corporation is reviewing a plan to upgrade the
entire corporate IT infrastructure. The architecture consists of a centralized cloud environment hosting
the majority of data, small server clusters at each corporate location to handle the majority of customer
transaction processing, ATMs, and a new mobile banking application accessible from smartphones,
tablets, and the Internet via HTTP. The corporation does business having varying data retention and
privacy laws. Which of the following technical modifications to the architecture and corresponding
security controls should be implemented to provide the MOST complete protection of data?

Which of the following tool or technology would work BEST for obtaining more information on this traffic?

While reviewing the monthly internet usage it is noted that there is a large spike in traffic classified as
“unknown” and does not appear to be within the bounds of the organizations Acceptable Use Policy.
Which of the following tool or technology would work BEST for obtaining more information on this
traffic?

Which of the following is the MOST likely cause of the connectivity issues?

A user of the wireless network is unable to gain access to the network. The symptoms are:
1.) Unable to connect to both internal and Internet resources
2.) The wireless icon shows connectivity but has no network access
The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to
authenticate. Which of the following is the MOST likely cause of the connectivity issues?

which of the following controls should the CISO focus on in the report?

A chief Financial Officer (CFO) has asked the Chief Information Officer (CISO) to provide responses to a
recent audit report detailing deficiencies in the organization security controls. The CFO would like to
know ways in which the organization can improve its authorization controls. Given the request by the
CFO, which of the following controls should the CISO focus on in the report? (Select Three)

Which of the following mobile device capabilities should the user disable to achieve the stated goal?

A mobile device user is concerned about geographic positioning information being included in messages
sent between users on a popular social network platform. The user turns off the functionality in the
application, but wants to ensure the application cannot re-enable the setting without the knowledge of
the user. Which of the following mobile device capabilities should the user disable to achieve the stated
goal?


Page 173 of 178« First...102030...171172173174175...Last »