PrepAway - Latest Free Exam Questions & Answers

Tag: Briefing SY0-401 (update October 21th, 2017)

Briefing SY0-401: CompTIA Security+ (update October 21th, 2017)

Which of the following has MOST likely been installed o…

During a server audit, a security administrator does not notice abnormal activity. However, a network security
analyst notices connections to unauthorized ports from outside the corporate network. Using specialized tools,
the network security analyst also notices hidden processes running. Which of the following has MOST likely
been installed on the server?

Which of the following malware categories BEST describe…

A program has been discovered that infects a critical Windows system executable and stays dormant in
memory. When a Windows mobile phone is connected to the host, the program infects the phone’s boot loader
and continues to target additional Windows PCs or phones. Which of the following malware categories BEST
describes this program?

You must review all network logs to discover the scope of the attack…

SIMULATION
A security administrator discovers that an attack has been completed against a node on the corporate network.
All available logs were collected and stored.
You must review all network logs to discover the scope of the attack, check the box of the node(s) that have
been compromised and drag and drop the appropriate actions to complete the incident response on the
network. The environment is a critical production environment; perform the LEAST disruptive actions on the
network, while still performing the appropriate incident responses.
Instructions: The web server, database server, IDS, and User PC are clickable. Check the box of the node(s)
that have been compromised and drag and drop the appropriate actions to complete the incident response on
the network. Not all actions may be used, and order is not important. If at anytime you would like to bring back
the initial state of the simulation, please select the Reset button. When you have completed the simulation,
please select the Done button to submit. Once the simulation is submitted, please select the Next button to
continue.

Which of the following is the CTO concerned with?

Ann, the Chief Technology Officer (CTO), has agreed to allow users to bring their own device (BYOD) in order
to leverage mobile technology without providing every user with a company owned device. She is concernedthat users may not understand the company’s rules, and she wants to limit potential legal concerns. Which of
the following is the CTO concerned with?


Page 129 of 178« First...102030...127128129130131...140150160...Last »