PrepAway - Latest Free Exam Questions & Answers

Tag: Exam SY0-401 (update November 3rd, 2015)

Exam SY0-401: CompTIA Security+ Certification (update November 3rd, 2015)

Which of the following cloud technologies should she look into?

Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save

money while providing valuable services. She is looking for a cost-effective solution to assist in
capacity planning as well as visibility into the performance of the network. Which of the following
cloud technologies should she look into?

Which of the following is the type of vulnerability described?

When performing the daily review of the system vulnerability scans of the network Joe, the
administrator, noticed several security related vulnerabilities with an assigned vulnerability
identification number. Joe researches the assigned vulnerability identification number from the
vendor website. Joe proceeds with applying the recommended solution for identified vulnerability.
Which of the following is the type of vulnerability described?

Which of the following is the BEST management option for review of the new accounts?

Joe is the accounts payable agent for ABC Company. Joe has been performing accounts payable
function for the ABC Company without any supervision. Management has noticed several new
accounts without billing invoices that were paid. Which of the following is the BEST management
option for review of the new accounts?

Which of the following would BEST alleviate the developer’s reports?

Ann, the network administrator, is receiving reports regarding a particular wireless network in the
building. The network was implemented for specific machines issued to the developer department,
but the developers are stating that they are having connection issues as well as slow bandwidth.
Reviewing the wireless router’s logs, she sees that devices not belonging to the developers are
connecting to the access point. Which of the following would BEST alleviate the developer’s
reports?

which of the following as a mitigation method against further attempts?

Joe analyzed the following log and determined the security team should implement which of the
following as a mitigation method against further attempts?

Host 192.168.1.123
[00:00:01]Successful Login: 015 192.168.1.123 : local
[00:00:03]Unsuccessful Login: 022 214.34.56.006 :RDP 192.168.1.124
[00:00:04]UnSuccessful Login: 010 214.34.56.006 :RDP 192.168.1.124
[00:00:07]UnSuccessful Login: 007 214.34.56.006 :RDP 192.168.1.124
[00:00:08]UnSuccessful Login: 003 214.34.56.006 :RDP 192.168.1.124

Which of the following services should be disabled to ensure secure communications?

A new web server has been provisioned at a third party hosting provider for processing credit card
transactions. The security administrator runs the netstat command on the server and notices that
ports 80, 443, and 3389 are in a ‘listening’ state. No other ports are open. Which of the following
services should be disabled to ensure secure communications?


Page 173 of 181« First...102030...171172173174175...180...Last »