PrepAway - Latest Free Exam Questions & Answers

Tag: Exam SY0-401 (update April 21th, 2017)

Exam SY0-401: CompTIA Security+ Certification (update April 21th, 2017)

Which of the following MOST likely occurred?

An employee has been terminated due to inappropriate Internet use. A computer forensics technician at the organization acquired an image of the hard drive and
hashed it using MD5. The former employee has filed a lawsuit. The former employee’s attorney requests a copy of the image so it can be independently reviewed
by the legal team. Upon receiving the image, the attorney’s technician also generates a MD5 hash of the image and comes up with a different output than what was
provided. Which of the following MOST likely occurred?

Which of the following mitigations would be MOST approp…

A server administrator is investigating a breach and determines that an attacker modified the application log to obfuscate the attack vector. During the lessons
learned activity the facilitator asks for a mitigation response to protect the integrity of the logs should a similar attack occur. Which of the following mitigations would
be MOST appropriate to fulfill the requirement?

which of the following best security practices and avoi…

Joe has been in the same IT position for the last 27 years and has developed a lot of homegrown applications that the company utilizes. The company is concerned
that Joe is the only one who can administer these applications. The company should enforce which of the following best security practices and avoid Joe being a
single point of failure?

Which of the following should the administrator impleme…

A company provides wireless access for employees and a guest wireless network for visitors. The employee wireless network is encrypted and requires a
password. The guest wireless network does not use an encrypted connection and does not require a password. An administrator walks by a visitor’s laptop and
notices the following command line output:
reaver – I mon – b 7a : E5 : 9A : 42 : 2C : C1 – vv
Starting…..
[+] Trying pin 12345678
[+] 93.41% complete @ 2015-01-10 10:30:21 (15 seconds)
[!] WARNING: 10 failed connections in a row
[+] Trying pin 12345688

Which of the following should the administrator implement and why?

Which of the following capabilities would be MOST suita…

A network has been impacted by downtime resulting from unauthorized devices connecting directly to the wired network. The network administrator has been
tasked to research and evaluate technical controls that would effectively mitigate risks associated with such devices. Which of the following capabilities would be
MOST suitable for implementation in this scenario?


Page 19 of 53« First...10...1718192021...304050...Last »