Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
SY0-301 V8.02 - Copy

SY0-301 V8.02 - Copy

Ratings: (0)|Views: 2,447|Likes:
Published by jim2483

More info:

Published by: jim2483 on Jun 08, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/18/2012

pdf

text

original

 

estpassport
T
             
&
 A
           
 
The safer , easier way to help you pass any IT exams.
 
1
 
 / 
37
 
Exam
:
SY0-301
 
Title
:
Version
: V8.02Security+ Certification Exam2011 version
 
The safer , easier way to help you pass any IT exams.
 
2
 
 / 
37
 
1.Which of the following elements of PKI are found in a browser's trusted root CA?
A. Private
 
key
B. Symmetric key
C. Recovery key
D. Public keyAnswer: D
2.Which of the following protocols only encrypts password packets from client to server
.
?
A. XTACACS
B. TACACS
C. RADIUS
D. TACACS+
Answer: C
3.Where are revoked certificates stored
?
A. Recovery agentB. Registration
C. Key escrow
D. CRL
Answer: D
4.DRPs should contain which of the following?
A. Hierarchical list of non
-
critical personnel
B. Hierarchical list of critical systems
C. Hierarchical access control listsD. Identification of single points of failure
Answer: B
5.A system administrator could have a user level account and an administrator account to prevent:A. password sharing.
B. escalation of privileges.
C. implicit deny.
D. administrative account lockout.
 
Answer: B
6.Which of the following is the BEST way to mitigate data loss if a portable device is compromised?A. Full disk encryption
B. Common access card
C. Strong password complexity
D. Biometric authentication
Answer: A
7.Which of the follow
ing protocols should be blocked at the network perimeter to prevent hostenumeration by sweep devices?

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Joey Gervais liked this
walakomo liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->