PrepAway - Latest Free Exam Questions & Answers

Tag: Exam SY0-401 (update April 21th, 2017)

Exam SY0-401: CompTIA Security+ Certification (update April 21th, 2017)

Which of the following will help mitigate the risk in t…

A company must send sensitive data over a non-secure network via web services. The company suspects that competitors are actively trying to intercept all
transmissions. Some of the information may be valuable to competitors, even years after it has been sent. Which of the following will help mitigate the risk in the
scenario?

which of the following controls would the BEST to incor…

A project manager is working with an architectural firm that focuses on physical security. The project manager would like to provide requirements that support the
primary goal of safely. Based on the project manager’s desires, which of the following controls would the BEST to incorporate into the facility design?

Which of the following would explain why users are bein…

A security analyst has been investigating an incident involving the corporate website. Upon investigation, it has been determined that users visiting the corporate
website would be automatically redirected to a, malicious site. Further investigation on the corporate website has revealed that the home page on the corporate
website has been altered to include an unauthorized item. Which of the following would explain why users are being redirected to the malicious site?

which of the following authentication mechanisms?

A user contacts the help desk after being unable to log in to a corporate website. The user can log into the site from another computer in the next office, but not
from the PC. The user’s PC was able to connect earlier in the day. The help desk has user restart the NTP service. Afterwards the user is able to log into the
website. The MOST likely reason for the initial failure was that the website was configured to use which of the following authentication mechanisms?

which of the following should the security manager impl…

Jo an employee reports to the security manager that several files in a research and development folder that only Joe has access to have been improperly modified.
The modified data on the files in recent and the modified by account is Joe’s. The permissions on the folder have not been changed, and there is no evidence of
malware on the server hosting the folder or on Joe’s workstation. Several failed login attempts to Joe’s account were discovered in the security log of the LDAP
server. Given this scenario, which of the following should the security manager implement to prevent this in the future?


Page 44 of 53« First...102030...4243444546...50...Last »