PrepAway - Latest Free Exam Questions & Answers

Tag: Exam SY0-401 (update November 3rd, 2015)

Exam SY0-401: CompTIA Security+ Certification (update November 3rd, 2015)

Which of the following would meet all three goals?

A company hosts its public websites internally. The administrator would like to make some
changes to the architecture.
The three goals are:
(1) reduce the number of public IP addresses in use by the web servers
(2) drive all the web traffic through a central point of control
(3) mitigate automated attacks that are based on IP address scanning
Which of the following would meet all three goals?

Which of the following systems should be deployed?

Ann is the data owner of financial records for a company. She has requested that she have the
ability to assign read and write privileges to her folders. The network administrator is tasked with
setting up the initial access control system and handing Ann’s administrative capabilities. Which of
the following systems should be deployed?

Which of the following policies is being enforced?

The IT department noticed that there was a significant decrease in network performance during
the afternoon hours. The IT department performed analysis of the network and discovered this
was due to users accessing and downloading music and video streaming from social sites. The IT
department notified corporate of their findings and a memo was sent to all employees addressing
the misuse of company resources and requesting adherence to company policy. Which of the
following policies is being enforced?

Which of the following would BEST mitigate this issue?

Ann was reviewing her company’s event logs and observed several instances of GUEST
accessing the company print server, file server, and archive database. As she continued to
investigate, Ann noticed that it seemed to happen at random intervals throughout the day, but
mostly after the weekly automated patching and often logging in at the same time. Which of the
following would BEST mitigate this issue?

Which of the following could be utilized to provide protection from this type of attack?

A security administrator is notified that users attached to a particular switch are having intermittent
connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing
attack. Which of the following could be utilized to provide protection from this type of attack?

which of the following would be the BEST way to share the file with Joe?

Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT
group, to edit a file. Currently, the file has the following permissions:

Ann: read/write
Sales Group: read
IT Group: no access
If a discretionary access control list is in place for the files owned by Ann, which of the following
would be the BEST way to share the file with Joe?


Page 174 of 181« First...102030...172173174175176...180...Last »