CompTIA SY0-201

SY0-201 CompTIA Security+ (2008 Edition) Exam

Practice Test
Version 6.0

CompTIA SY0-201: Practice Exam QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router B. Vampire tap C. Firewall D. Fiber-optic splicer Answer: B

QUESTION NO: 2 After disabling SSID broadcast for all wireless routers on the network, the administrator noticed that the Same unauthorized users were still accessing the network. Which of the following did the administrator fail to do? A. Re-enable the SSID. B. Disallow 802.11a traffic on the network. C. Change the SSID. D. Enable ARP cache spoofing protection. Answer: C

QUESTION NO: 3

Exploitation of the 5-day grace period for domain name registration is referred to as: A. domain name poisoning. B. domain name kiting. C. domain name lookup. D. domain name service. Answer: B

QUESTION NO: 4 Which of the following ports is susceptible to DNS poisoning? A. 23 B. 53 "Pass Any Exam. Any Time." - www.actualtests.com 2

Ac

tua

lTe

sts

.co

m

CompTIA SY0-201: Practice Exam C. 80 D. 8080 Answer: B

QUESTION NO: 5 Why is an ad-hoc network a security risk? A. An ad-hoc network allows access to another computer at the same level of the logged in user, compromising information. B. An ad-hoc network allows access to the nearest access point which may allow a direct connection to another computer. C. An ad-hoc network allows access to the nearest access point which may give elevated rights to the connecting user. D. An ad-hoc network allows access to another computer but with no rights so files cannot be copied or changed. Answer: A

QUESTION NO: 6

A. A user is able to distribute connections to the network for load balancing using a centralized list of approved devices. B. A user is able to distribute connections to the network using cached credentials on a local machine. C. A user is able to control connections to the network using a centralized list of approved devices. D. A user is able to control connections to the network using cached credentials on a local machine. Answer: C

QUESTION NO: 7

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

Which of the following is a benefit of network access control (NAC)?

tua

lTe

Explanation: A wireless network operates in one of two modes, ad-hoc or infrastructure. In the ad hoc mode, each station is a peer to the other stations and communicates directly with other stations within the network. No AP is involved. All stations can send Beacon and Probe frames.

sts

.co

m

3

B. Phishing C. Any Time. Botnets B. D.com 4 Ac tua lTe QUESTION NO: 9 sts . B.www." . C.actualtests. Answer: A QUESTION NO: 10 Which of the following allows remote access servers to authenticate to a central server? A. Restore all network connectivity. Worm Answer: A When used properly. it is a symmetric key. Hold a follow-up meeting to review lessons learned.co m . D. Answer: B QUESTION NO: 8 Which of the following security threats MOST frequently uses IRC to communicate with a remote host? A. a one time pad is considered an unbreakable algorithm because: A. Password authentication D. the key is not reused. C. RADIUS Answer: D "Pass Any Exam. WLAN properties B. Perform a full recovery so all devices are back in working order. Notify all personnel that a disaster has taken place. it is based on the generation of random numbers.CompTIA SY0-201: Practice Exam Which of the following is the FINAL phase of disaster recovery? A. Authentication protocols C. Spam D. it uses a stream cipher.

C.co Which of the following security threats would MOST likely use IRC? m 5 . which of the following should be done on a regular basis to help facilitate this need? "Pass Any Exam. B. Require authentication for all inbound and outbound SMTP traffic. Spam ." .CompTIA SY0-201: Practice Exam QUESTION NO: 11 Which of the following is the BEST course of action to ensure an email server is not an open relay? A. Pop-up blocker Answer: D QUESTION NO: 14 An administrator wants to make sure that network machines stay up-to-date with current solutions. Which of the following would help prevent this in the future? tua lTe sts A. Logic bombs D. Any Time. Antivirus D. Adware C. Require authentication for all inbound SMTP traffic.www. Botnets B. Require authentication for all outbound SMTP traffic. Answer: A QUESTION NO: 12 Answer: A QUESTION NO: 13 A. D. Spam blocker C. Anti-Spyware B.com Ac A user contacts technical support stating they received notification in a web browser that their computer is infected with a virus. Block all inbound traffic on SMTP port 25.actualtests.

www. D. Group policy updates B. WPA D. Use employee A's public key to verify the digital signature. B. Employee B wants to make sure that the message is truly from employee A." . C. D. MD5 C. Which of the following will employee B do to verify the source of the message? A. Answer: B On which of the following algorithms is PGP based? A.com Ac tua lTe sts QUESTION NO: 16 . Driver updates D. Configuration baselines Answer: B QUESTION NO: 15 Which of the following is the main disadvantage of implementing a certificate revocation list? A. B.actualtests. Use employee B's public key to unencrypted the message.co m 6 . Answer: D "Pass Any Exam. Patch management C. Only a certain number of certificates can be revoked. Revocation is not instantaneous.CompTIA SY0-201: Practice Exam A. The CRL database cannot be duplicated. It is a single point of failure and expensive to maintain. DES Answer: A QUESTION NO: 17 Employee A sends employee B an encrypted message along with a digital signature. Any Time. C. Use employee B's private key to unencrypted the message. RSA B. Use employee A's private key to verify the digital signature.

Forwards requests for services from a client Answer: D "Pass Any Exam. Any Time. E.D tua A." .CompTIA SY0-201: Practice Exam QUESTION NO: 18 Employee A wants to send employee B an encrypted message that will identify employee A as the source of the message. A. Analyzes packets B. Vendors lTe sts Which of the following groups should be able to view the results of the risk assessment for an organization? (Select TWO). QUESTION NO: 19 QUESTION NO: 20 Which of the following describes the role of a proxy server? A. Use only symmetric encryption to send the message.co m Answer: A. All employees D.actualtests. Which of the following will employee A do to accomplish this? (Select TWO). Use employee B's public key to encrypt the message. Executive management E. F. Blocks access to the network D. D. B. . Use employee A's private key to sign the message. Use the message application to mark the message as urgent. Information security employees C. Use employee B's private key to encrypt the message. C. HR employees B. Serves as ahoneypot C.www.com Ac Answer: B. Use employee A's public key to sign the message.E 7 .

com 8 Ac Which of the following is the BEST solution for an administrator to implement in order to learn more about the zeroday exploit attacks on the internal network? tua lTe sts .CompTIA SY0-201: Practice Exam QUESTION NO: 21 A recent risk assessment has identified vulnerabilities on a production server. inspect and analyze data being passed through SSH tunnels. Any Time. The technician realizes it was recently re-imaged after a component failed on it. D." . verify adequate bandwidth is being provided for existing traffic.www. If the firewallruleset does not allow incoming traffic to the vulnerable port Answer: A QUESTION NO: 22 NIDS can be used to help secure a network from threats MOST effectively by watching network traffic in order to: A. ensure proper password strength. observe if any systems are communicating using unauthorized protocols. C. If all device drivers were updated D. A HIDS D. Which of the following is the FIRST item to assess when attempting to mitigate the risk? A. B.actualtests. Answer: D QUESTION NO: 23 A.co m . Astateful firewall C. AHoneypot B. If the spam filters have been properly applied C. Bandwidth utilization increases around the time that a popular radio show is broadcast. An IDS Answer: A QUESTION NO: 24 An administrator is having difficulty getting staff to adhere to group policy directives regarding streaming audio. Which of the following is the BEST solution to implement? "Pass Any Exam. If all current service packs andhotfixes were re-applied B.

CompTIA SY0-201: Practice Exam A. Application logs for service start and stop events D. Enforce group policy B. Network-based Intrusion Detection System (NIDS) C.actualtests. Disable logging Answer: D Answer: B QUESTION NO: 27 Which of the following determines if traffic is blocked or allowed? A. System logs for patch and reboot events B. Access Control List (ACL) B.com Ac tua A. Deleting the cookies C. Any Time. Deploy content filters D. Change the password policy C. Shoulder surfing B.co m 9 . Increase the max size of the log D." . Implement time of day restrictions Answer: C QUESTION NO: 25 Which of the following is the BEST way for an attacker to conceal their identity? A. Security logs for failed logon attempts lTe Which of the following logs would show that someone has been querying information about a Company's networks? sts QUESTION NO: 26 . Logical keys Answer: A "Pass Any Exam. DNS logs for zone transfers C.www. Username and passwords D.

VLAN B. the MOST appropriate setting for electronic cipher locks would be to: A. B. Physical memory B. allow personnel to exit the building only after using a valid swipe card and key.CompTIA SY0-201: Practice Exam QUESTION NO: 28 Which of the following is the primary location where global policies are implemented in an organization? A. D.com 10 Ac tua QUESTION NO: 30 lTe Answer: B sts A. allow personnel to exit the building without any forms of authentication. DMZ C. User documentation D. by separating a network and still allowing access to that network? . Security group Answer: B QUESTION NO: 29 In the event of a fire." . Domain C. C. Any Time.co m Which of the following provides a security buffer. Answer: B QUESTION NO: 31 Which of the following protocols uses a three-way handshake during communication with multiple hosts? A.www.actualtests. allow personnel to exit the building using only a photo ID badge. NAC D. SMTP "Pass Any Exam. after passing through a firewall. allow personnel to exit the building only after security confirms the threat and electronically releases all locks. NAT .

However. TCP D. Firewall C. Which of the following would be MOST effective to prevent this from happening? A. RDP Answer: C QUESTION NO: 32 A number of users on the company network have been contracting viruses from required social networking sites.CompTIA SY0-201: Practice Exam B." . Which of the following authentication types is this? sts . Single sign-on C. NIDS B. Which of the following is the reason that only this call center representative is unable to connect to the PBX? A. UDP C.com 11 Ac A. one of the representatives reports that they can no longer connect to the call center PBX. and connect back to the call center over the Internet. Proxy server D.actualtests. There is one password for unlocking the encryption and one password for logging onto the network.www. Both passwords are synchronized and used to login to the machine. Honeypot Answer: C QUESTION NO: 33 Answer: B QUESTION NO: 34 A call center uses 50 remote representatives to handle calls for clients. Three factor D. Any Time. Two factor tua lTe A user logs onto a laptop with an encrypted hard drive. The representatives run software based IP phones on their laptops. Biometric B. The representative has a disk defragmentation program installed. "Pass Any Exam.co m .

CompTIA SY0-201: Practice Exam B. Rootkit Answer: D A NIPS is primarily used for which of the following purposes? A.co m 12 . Update the plan as needed. Answer: C QUESTION NO: 35 A network administrator is alerted to an incident on a file server. The call center has recently installed HIDS. Distribute the plan. C. The alerting application is a file integrity checker. Teardrop attack D. The representative has amis-configured software firewall. Answer: A "Pass Any Exam. DDOS C. Store the plan where all employees can see it. To take action against known threats Answer: D QUESTION NO: 37 Which of the following should be done FIRST after creating a formal disaster recovery plan? A. The call center has placed the firewall on the edge of the network. D. D. To monitor network traffic in promiscuous mode B. Any Time.com Ac tua lTe sts QUESTION NO: 36 . Test the plan. ARP poisoning B. B.www.actualtests. To alert the administrator to known anomalies C. C. Which of the following is a possible source of this HIDS alert? A." . To log any known anomalies D.

D. Store tapes near the servers. Any Time.E QUESTION NO: 39 Answer: B QUESTION NO: 40 A company is having a problem with users setting up rogue access points. C. B." . Which of the following encryption methods should they implement to provide the highest level of security? A. Implement least privilege access D. It has heavier shielding. Which of the following solutions would be the BEST for the administrator to implement? A. Password policy hardening B. MAC address filtering Answer: D QUESTION NO: 41 A company sets up wireless access points for visitors to use wireless devices. C.co m Which of the following is the reason fiber optic cable is MORE secure than CAT5 cable? . Stop SSID broadcasting C. . A. It transmits signals faster. E. Keep the tapes user accessible. SHA-256 B. Store backup's offsite.www. Answer: D. Data is automatically encrypted. D. Label the media.actualtests. B. Format tapes annually. WEP "Pass Any Exam. It is harder to tap into.com 13 Ac tua lTe sts A.CompTIA SY0-201: Practice Exam QUESTION NO: 38 Which of the following are BEST practices in regards to backup media? (Select TWO).

B. Enter two different passwords D. a man-in-the-middle attack. Answer: D QUESTION NO: 43 Which of the following would be used to gain access to a data center where the administrator would have to use multiple authentication factors? A.actualtests. Fingerprint and retina scan C. B. Not all users will know which files are executable installations. the administrator needs to be aware of which of the following disadvantages? A. C. D. Such a policy requires a great deal of administrative overhead.co m 14 .CompTIA SY0-201: Practice Exam C. exploiting a back door. Fingerprint scan and password B. This type of attack is BEST known as: A. WPA Answer: C QUESTION NO: 42 When implementing a group policy restricting users from running software installations. ID badge and smartcard Answer: A QUESTION NO: 44 An attacker uses an account that allows read-only access to the firewall for checking logs and configuration files to gain access to an account that gives full control over firewall configuration. C." . The policy will restrict remote patching of user workstations. exploiting a weak password.www. Some users may have a legitimate need for installing applications. WPA2 D. privilege escalation. Any Time.com Ac tua lTe sts . D. Answer: D "Pass Any Exam.

DNS zone transfers B.CompTIA SY0-201: Practice Exam QUESTION NO: 45 A network device contains a feature that provides emergency administrator access from any port by sending a specific character sequence." .www. This is an example of a: A. S/MIME certificates Answer: D Explanation: Secure Multipurpose Internet Mail Extensions (S/MIME) is a standard used for encrypting e-mail. SSL over VPN C. Any Time. "Pass Any Exam. Whole disk encryption B.actualtests. default account.com Ac tua lTe sts A. Service startup . Answer: B QUESTION NO: 46 Answer: D QUESTION NO: 47 Which of the following BEST describes a tool used to encrypt emails in transit? A. Database usage D. C. B. DDoS attack. It uses the PKCS #7 standard (Cryptographic Message Syntax Standard) and is the most widely supported standard used to secure e-mail communications. back door. D. DoS attack.co Which of the following events are typically written to system logs? m 15 . Web GET requests C. S/MIME contains signature data. Digital signatures D.

co m 16 . Analyzing LAN traffic for file sharing software B. Translates between private addresses and public addresses tua lTe sts . Provides access based on ARP requests C.www. D. Any Time.CompTIA SY0-201: Practice Exam QUESTION NO: 48 Which of following protocols can operate in tunnel mode? A.actualtests. Translates between DHCP requests and IP addresses D.com Ac A. Answer: D QUESTION NO: 50 Which of the following BEST describes NAC? Answer: A QUESTION NO: 51 Which of the following BEST describes the function of a NIDS? A. Analyzing network traffic for suspicious traffic "Pass Any Exam. C. SHTTP C. Diverting suspicious traffic in real-time C." . Provides access based on predetermined characteristics B. A network that resides between trusted and non-trusted networks. B. SSL D. A trusted segment to a VPN concentrator. A trusted network that is encrypted end-to-end. SFTP Answer: A QUESTION NO: 49 Which of the following BEST characterizes a DMZ? A. Diverting spyware traffic to the DMZ D. A connection between two trusted networks. IPSec B.

www. .com Ac An administrator needs to ensure that all machines deployed to the production environment follow strict company guidelines.actualtests. Mandatory Access Control (MAC) B. Log book D. Escorts Answer: A QUESTION NO: 53 Answer: C QUESTION NO: 54 A. ID badges C. Virtualization hosting is only possible on one specific OS. B. employees are only given rights to perform their current job function. Any Time. Proximity cards B.co Which of the following is true about the application of machine virtualization? m 17 . Security templates C. D. C. Machine virtualization is only possible in a 64-bit environment. The virtualization host OS must be within two revisions of the guest OS. Some malware is able to detect that they are running in a virtual environment.CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 52 Which of the following BEST secures ingress and egress points in a data center? A. Horizontal scans D. Which of the following are they MOST likely to use? tua lTe sts A." . Which of the following BEST describes this practice? "Pass Any Exam. Vertical scans Answer: B QUESTION NO: 55 In order to help maintain system security.

C. honeypot. dummy terminal. B. Virus B.www.com Ac A.co m 18 .CompTIA SY0-201: Practice Exam A. Implicit deny B. Default account B. Adware C. Separation of duties Answer: C QUESTION NO: 56 Which of the following should an administrator make sure is disabled or changed prior to putting a device node into a live environment? A. Local user accounts C. Logic Bomb D. Botnet "Pass Any Exam. Which of the following would be responsible? A. content filter. Remote user accounts D. D. Job rotation C. proxy. Least privilege D. Any Time.actualtests. tua lTe A computer or device that is setup on the network merely to monitor the habits and techniques of a suspected attack is known as a: sts ." . Domain user accounts Answer: A QUESTION NO: 57 Answer: B QUESTION NO: 58 Multiple machines are detected connecting to a specific web server during non-business hours and receiving instructions to execute a DNS attack.

" .co A security administrator is worried about attackers accessing a specific server within the company's network. NAT C.com Ac QUESTION NO: 61 tua Answer: A lTe A.CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 59 Which of the following should a developer use to protect cookies while in transit? A. VPN D. DMZ Answer: B QUESTION NO: 62 "Pass Any Exam. Encryption B. Antivirus C. Proprietary formatting C. Protocol analyzer D.www. Any Time. Digital signing Answer: A QUESTION NO: 60 Which of the following provides an organization with the ability to hide an internal private network. Which of the following would allow the security staff to identify unauthorized access to the server? m 19 . HIDS B. Anti-spyware D. Honeypot sts . VLAN B.actualtests. while simultaneously providing additional IP addresses? A.

Any Time.CompTIA SY0-201: Practice Exam Which of the following will MOST likely block known network attacks? A. NIPS D. HIPS B. which of the following is the NEXT step after gaining access to a system? A. IDS "Pass Any Exam.www. Vampire tap C. Firewall B. IPS D.actualtests. DMZ Answer: A QUESTION NO: 64 During a data exfiltration penetration test. Attack weak passwords B. DoS C.com Ac tua lTe sts . NIDS B. NIDS Answer: C QUESTION NO: 63 Which of the following allows a technician to retroactively identify a security incident? A. Internet content filter C. Privilege escalation Answer: D QUESTION NO: 65 Which of the following allows an attacker to join a network and view traffic on the network by physical connection? A. HIDS C.co m 20 ." . Proxy server D. Use default accounts D.

Weak SSID C. Registry edits C.www. Group policy D.co Which of the following is the BEST way to restrict the GUI interface on a workstation? m 21 . A single point of failure on the network Answer: D QUESTION NO: 69 Which of the following describes what has occurred after a user has successfully gained access to a secure system? "Pass Any Exam.CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 66 Which of the following describes an attack where a person searches for open access points? A. Requirement to remember one password C. Batch file B. Any Time. Rogue access point D. War driving B. Multiple points of entry into the network D. Increased overhead for server processing B." . Local policy .actualtests. WEP Answer: A QUESTION NO: 67 Answer: C QUESTION NO: 68 Which of the following is a weakness of single sign-on? A.com Ac tua lTe sts A.

CompTIA SY0-201: Practice Exam A. Task manager C. Man-traps D. Physical access logs C. NIC bindings Answer: A "Pass Any Exam. Identification D.com Ac A. NetBIOS D. Authentication B. Systems monitor B. Physical tokens B. Task manager D. Performance monitor C.actualtests. Authenticity C. Performance baseline B." . Any Time. Protocol analyzer tua lTe Which of the following will allow a security administrator to determine potentially malicious traffic traversing the network? sts .www.co m 22 . Hardware locks Answer: B QUESTION NO: 71 Answer: D QUESTION NO: 72 Which of the following will allow a security administrator to help detect a DDoS? A. Confidentiality Answer: A QUESTION NO: 70 Which of the following allows management to track whether staff members have accessed an authorized area? A.

Availability D. SSL/TLS D.actualtests. Authenticity Answer: A Which of the following is the MOST common way to allow a security administrator to securely administer remote *NIX based systems? A. IPSec B. PPTP C.www. System Answer: A QUESTION NO: 74 Which of the following does file encryption protect? A. DNS C.co m 23 . Confidentiality B. Any Time.CompTIA SY0-201: Practice Exam QUESTION NO: 73 Which of the following logs contains user logons and logoffs? A. Application D. SSH Answer: D QUESTION NO: 76 Which of the following allows two people to communicate securely without having to know each other prior to communicating? "Pass Any Exam.com Ac tua QUESTION NO: 75 lTe sts . Identification C. Security B." .

Anti-spyware C. Determining if the host is already infected Answer: C "Pass Any Exam. Determining if the host can connect to the Internet B. Worm C. Determining if the host is Windows or Linux based C. Symmetric keys D. Antivirus lTe Which of the following prevents unsolicited email messages from entering the company's network? sts . 3DES B." . Anti-spam D. Pop-up blockers B. Virus B. Any Time. PKI Answer: D QUESTION NO: 77 Which of the following does a malicious insider install in order to attack the system at a predetermined date? A.com Ac tua A.www.CompTIA SY0-201: Practice Exam A. Determining if the host if a virtual or physical D. Logic bomb Answer: D QUESTION NO: 78 Answer: C QUESTION NO: 79 Which of the following is a common evasion technique by attackers to avoid reverse engineering? A.actualtests. Spam D.co m 24 . AES C.

NTLM B. NTLMv2 D.com 25 Ac tua lTe sts . NIDS D. Single sign-on C. Access point C.www. DDoS Answer: B QUESTION NO: 81 Which of the following BEST controls traffic between networks? A. One factor authentication B. Two factor authentication D. DNS D. NTFS Answer: D QUESTION NO: 83 Which of the following authentication models often requires different systems to function together and is complicated to implement in non-homogeneous environments? A. Any Time. ARP spoofing B.actualtests." . HIPS B. Three factor authentication "Pass Any Exam. IPSec C.co m . Firewall Answer: D QUESTION NO: 82 Which of the following will allow a technician to restrict access to one folder within a shared folder? A. Kiting C.CompTIA SY0-201: Practice Exam QUESTION NO: 80 Which of the following is a tactic used by malicious domain purchasing organizations? A.

Risk mitigation C." . TACACS B. Avoiding negative risk C. Risk avoidance D. Leveraging positive risk B. RAS C. Kerberos Answer: D QUESTION NO: 85 Answer: D QUESTION NO: 86 A.co Which of the following describes bringing risk to an acceptable level? m 26 . PPTP D. Any Time.CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 84 Which of the following would be used for authentication in Active Directory? A. Rick avoidance B.www.com Ac Which of the following describes a situation where management decided the financial impact is less than the cost of fixing the security threat? tua lTe sts A. Risk acceptance D. Risk denial Answer: C QUESTION NO: 87 Which of the following cryptography concepts requires two keys? "Pass Any Exam. Risk mitigation .actualtests.

an alternate site should be geographically: A. Data confidentiality C. similar to the primary sites to ensure availability of resources and environmental functions. SSL D. WEP Answer: D A recipient's public key can be used by a data sender to ensure which of the following? A.com Ac tua lTe sts QUESTION NO: 89 . Answer: B "Pass Any Exam. Sender authentication Answer: B QUESTION NO: 90 To follow industry best practices for disaster recovery planning.CompTIA SY0-201: Practice Exam A. PGP C." . AES256 B. Symmetric D.co m 27 .actualtests. distant from the primary site to decrease the likelihood of an event affecting both. Asymmetric C. D. Any Time. Secret Answer: B QUESTION NO: 88 Which of the following is a transmission encryption that is generally regarded as weak? A. near to the primary site to reduce outage duration due to conveyance of primary site staff and hardware. TPM B.www. Sender anonymity B. C. B. near to the primary site to ensure frequent inspection by the primary sites staff. Data availability D.

co m 28 . A. Filtering based upon source address C.com Ac tua QUESTION NO: 93 lTe sts . Payload compression Answer: B Which of the following SSH configurations mitigate brute-force login attacks? (Select THREE).actualtests. Any Time. Enabling SSH version 2 B. Changing the default service port F. Limiting failed logon attempts D." . NAT traversal D. "Pass Any Exam.CompTIA SY0-201: Practice Exam QUESTION NO: 91 The IPSec authentication header provides which of the following? A. Integrity protection C. Payload compression Answer: B QUESTION NO: 92 IPSec provides which of the following? A. Payload encryption B.F QUESTION NO: 94 Which of the following are the MOST critical resources needed during Disaster Recovery Plan development? (Select TWO).www. Payload encryption C. Enforcing use of cryptographic keys E.D. New IP headers B. Disabling default accounts Answer: C. End-point confidentiality D.

C QUESTION NO: 95 In which of the following situations is a web application firewall MOST likely used? A. Documenting the security assessment and decision. C. User access and rights review B. Reverse engineering non-vendor supplied patches. External requests to UDP port 445 needs to be blocked.co m 29 . D. lTe Which of the following is part of the patch management process? sts . Key management D. Key escrow Answer: C "Pass Any Exam. System administrators D. Trusted Platform Module (TPM) C. Commercial vendors C. Answer: B QUESTION NO: 96 Answer: A QUESTION NO: 97 Which of the following is the process by which encryption keys are distributed? A. Communication between DNS servers needs to be encrypted. Customers Answer: A. D. Examining firewall and NIDS logs. Data owners B. B. Replacing aging network and computing equipment. Input to an application needs to be screened for malicious content. End users E. Any Time." . B.actualtests. Physical access to a console needs to be secured.CompTIA SY0-201: Practice Exam A.www. C.com Ac tua A.

CompTIA SY0-201: Practice Exam QUESTION NO: 98 Which of the following has a primary goal of hiding its processes to avoid detection? A.co m 30 . Rootkit C. Logic bomb Answer: A QUESTION NO: 100 Which of the following does a risk assessment include? A. Reducing the cost to recover from a security incident. attacks. B. and social engineering B. cost. Worm B. Virus Answer: B QUESTION NO: 99 Which of the following is associated with a command and control system? A. and asset values C.www. C. Virus D." . "Pass Any Exam. Rootkit C. Reducing the chances that a threat will exploita vulnerability. and budget D. Management.actualtests. vulnerabilities. Exploits. Reducing the time from vulnerability discovery to patch deployment. D. and enforcement Answer: B QUESTION NO: 101 Which of the following BEST describes the purpose of risk mitigation? A. Botnet B. Reducing the work associated with patch management.com Ac tua lTe sts . Policies. Threats. Any Time. procedures. Logic bomb D.

Intrusion prevention systems C.CompTIA SY0-201: Practice Exam Answer: C QUESTION NO: 102 Which of the following helps protect logs from compromise? A. Answer: A QUESTION NO: 103 Answer: C QUESTION NO: 104 A. Turn on all logging options. Available IP addresses . Port scanner Answer: D QUESTION NO: 105 A cipher lock system is which of the following security method types? "Pass Any Exam. C. Log failed logon attempts. Weak passwords D. Any Time.com Ac Which of the following vulnerability assessment tools would be used to identify weaknesses in a Company's router ACLs or firewall? tua lTe sts A." . Rainbow tables B. D. B. Brute force attacks D. Weak encryption keys C.actualtests.co Rainbow tables are primarily used to expose which of the following vulnerabilities? m 31 .www. Available ports B. View logs regularly. Centralize log management.

Which of the following security threats is the MOST probable cause? A. Biometrics B. Spyware D. Enforcing change management D. Testing the performance of each workstations UPS B. Spam Answer: C "Pass Any Exam. Worm C. Door access D. War driving Answer: D QUESTION NO: 108 After accessing several different Internet sites a user reports their computer is running slow. Creatinghoneypots D. IPS B." . Man-trap design Answer: C QUESTION NO: 106 A disaster recovery exercise should include which of the following action types? A. Any Time. Testing server restoration Answer: D The physical location of rogue access points can be discovered by using which of the following? A.actualtests.www. Proximity reader C.com Ac tua lTe sts QUESTION NO: 107 . The technician verifies that the antivirus definitions on that workstation are current. Trojan B. Creating a chain of custody C. Remote monitoring C.CompTIA SY0-201: Practice Exam A.co m 32 .

Any Time. Wrong VLAN D." . Firewall sts If an administrator wanted to be able to identify exactly which Internet sites are being accessed most frequently. IPS has blocked access C.actualtests.com Ac tua lTe A.co m 33 . which of the following tools would MOST likely be used? .www. The user does not have Internet access. The technician verifies that the user's computer has network connectivity. Port scanner B. B. but is unable to access the network. IDS C. The user does not have access to the printer. The printer is not setup up correctly on the server. The user does not have full access to the file server. D. Proxy server D. C. NAT is not properly configured Answer: C QUESTION NO: 110 Answer: C QUESTION NO: 111 A user reports that they cannot print anything from the file server or off the web to the network printer. Answer: D "Pass Any Exam.CompTIA SY0-201: Practice Exam QUESTION NO: 109 A user from the accounting department is in the Customer Service area and tries to connect to the file server through their laptop. File server is not on the DMZ B. Which of the following is the MOST probable reason the user cannot print? A. Which of the following is the MOST likely cause of this issue? A. No other users are having any problems printing. The network administrator checks the network connection and verifies that there is connectivity.

B.com Ac tua QUESTION NO: 114 lTe Answer: B sts A.www. Backup all current entries.000 in exchange for the documents decryption key." . changes within the firewall were approved. Retention policy B. perform and log all changes. Group policy D.CompTIA SY0-201: Practice Exam QUESTION NO: 112 All administrators are now required to use 15 character passwords. Account expiration configuration C. Save all current entries and perform changes. C.actualtests. The company CIO has received an email asking for $10. Which of the following is the BEST method to enforce this new password policy? A.co m Verifying the time and date certain users access a server is an example of which of the following audit types? 34 . Answer: C QUESTION NO: 115 Employees are unable to open internal company documents as they all appear to be encrypted. Account login C. Log all changes being performed. Account lockout . Which of the following processes should an administrator follow? A. D. User rights D. Forcing all users to change their password on next login Answer: C QUESTION NO: 113 During a change management meeting. Email announcements B. Any Time. Which of the following BEST describes this type of attack? "Pass Any Exam. Put firewall offline to perform all changes and return it online.

co m 35 . Ransomware B. Rootkit attack D. Antivirus C.com Ac tua A. Adware C.CompTIA SY0-201: Practice Exam A. Log analyzer B. Password complexity policy B. Trojan attack Answer: A QUESTION NO: 116 Which of the following is BEST suited to detect local operating system compromises? A. Port scanner Answer: D "Pass Any Exam. Protocol analyzer D. Anti-spam D. Account lockout policy D." . Access control lists lTe Which of the following security controls targets employee accounts that have left the company without going through the proper exit process? sts QUESTION NO: 117 . Personal firewall B.actualtests.www. System log Answer: B Answer: B QUESTION NO: 118 Which of the following is BEST suited to determine which services are running on a remote host? A. Account expiration policy C. HIDS C. Any Time.

Symmetric encryption Answer: D QUESTION NO: 122 Which of the following encryption technologies is BEST suited for small portable devices such as PDA's and cell phones? A.actualtests. Public key C. Privatekey B. Symmetric D.www. Encryption B.CompTIA SY0-201: Practice Exam QUESTION NO: 119 A security administrator has detected that the company websites source code contains suspicious numbers of white spaces and non-printable characters at the end of each line of code. Any Time. Asymmetric encryption D. Obfuscation Answer: C QUESTION NO: 120 Which of the following keys is used to sign an email message? A. Private C. Steganography D." .co m . TKIP "Pass Any Exam. Which of the following is being used in order to leak sensitive information to the competition? A. Codefuzzing C. Public B.com 36 Ac tua QUESTION NO: 121 lTe sts . CA key Answer: B Which of the following is used to encrypt the data sent from the server to the browser in an SSL session? A.

Lost password C. or someone has had their access revoked. Lost trust Answer: A. Elliptic curve Answer: D QUESTION NO: 123 Which of the following are reasons why a key may be revoked? (Select TWO).www. Key compromise B. TTP D. A certificate revocation is handled either through a Certificate Revocation List (CRL). AES192 D.com 37 Ac tua lTe sts QUESTION NO: 124 . an employee moved to a new company. The memory card is left on the administrator's office desk at the end of the day." .co m . A certificate may need to be revoked because it was stolen.CompTIA SY0-201: Practice Exam B. PGP C. CRL C.actualtests. RA Answer: B Explanation: Certificate revocation is the process of revoking a certificate before it expires. CA B. QUESTION NO: 125 A security administrator has received an SD memory card for the purpose of forensic analysis. The next day the security guard returns the SD card to the administrator because it was found by the night janitor. CAcompromise D. A. Any Time.C Which of the following contains a list of certificates that are compromised and invalid? A. Which of the following incident response procedures has been violated? "Pass Any Exam. Public key compromise E.

Any Time. Trojan B. Privilege escalation D. Security B.co m 38 . Which of the following is occurring? A. Performance D. Data retention D. Chain of custody B.actualtests. Evidence gathering C. DNS logs tua lTe Which of the following logs would a system administrator scan to reveal names and IP addresses of all websites visited by a company's employees? sts . Virus C. Firewall logs B. Security log D. Securing the site Answer: A QUESTION NO: 126 An employee with a regular user account has downloaded a software program which allowed the user to join the administrator group. DHCP logs C.www. System C. Buffer overflow Answer: C QUESTION NO: 127 Answer: D QUESTION NO: 128 Users report that websites are loading slowly." .CompTIA SY0-201: Practice Exam A. Access "Pass Any Exam. Which of the following web proxy logs is MOST likely to help a system administrator identify the cause for slow web traffic? A.com Ac A.

co Which of the following is the process of trying to locate unsecured wireless networks? m 39 . User's public key C.CompTIA SY0-201: Practice Exam Answer: C QUESTION NO: 129 Which of the following tools is BEST suited to determine if an IDS has triggered a false positive? A. Spoofing B. Networkmapper Answer: B QUESTION NO: 130 Answer: D QUESTION NO: 131 A. Netflow collector B.actualtests. User's private key B. Net hacking C. PGP's public key Answer: A QUESTION NO: 132 Which of the following is the EASIEST to implement for protecting an individual system? "Pass Any Exam. War dialing D. Any Time. Port scanner D.com Ac Which of the following would a user need to decrypt a data file that has been encrypted with the user's public key? tua lTe sts A." . War driving . Sender's private key D. Protocol analyzer C.www.

This is an example of which of the following security concepts? A.CompTIA SY0-201: Practice Exam A." . Group policies C. Personal software firewall B. The employee is given access to the accounting systems but no longer has access to the Human Resources systems. Job rotation tua lTe Employees in the accounting department move between accounts payable and accounts receivable roles every three months.com 40 Ac A. Password policy B.actualtests. This is an example of which of the following security concepts? sts . Single sign-on C. Chain of custody B.www. Separation of duties D. Internet content filter C. Biometric scanning Answer: C QUESTION NO: 134 Answer: D QUESTION NO: 135 An employee in the Human Resources department transfers to the Accounting department. Least privilege B. Least privilege C. Any Time. Default accounts "Pass Any Exam. Proxy server D. Separation of duties D.co m . Protocol analyzer Answer: A QUESTION NO: 133 Which of the following would be implemented to provide a check and balance against social engineering attacks? A.

Establish chain of custody. Implicit deny B. Power off the system.CompTIA SY0-201: Practice Exam D. Privilege escalation Answer: B QUESTION NO: 136 Which of the following should be performed during a forensic evaluation? A.com Ac tua lTe A. Which of the following security events is MOST important to monitor on the system? A. Any Time. Logon attempts C. Update virus definitions.www. B.co QUESTION NO: 137 m 41 . Troubleshoot system performance. Two factor authentication C. D. Account expiration D. C." .actualtests. Data file updates D. Failed data moves B. Answer: C Answer: D QUESTION NO: 138 An administrator is configuring a new system in a domain. Password changes Answer: B QUESTION NO: 139 "Pass Any Exam. Time of day restrictions sts Which of the following can be implemented to ensure an employee cannot use the system outside of normal business hours? .

Chain of custody Answer: D QUESTION NO: 142 Which of the following should the network administrator use to remotely check if a workstation is running a P2P application? A. Answer: C QUESTION NO: 140 The company's new administrative assistant wants to use their name as a password and asks if it is appropriate.com Ac tua Which of the following is used to determine who transported a hard drive during an incident response investigation? lTe sts . D. job rotation." . Forensic policy B.CompTIA SY0-201: Practice Exam A network administrator was recently promoted from their former position as a server administrator and now can no longer log on to servers they previously supported. B. B. Disclosure guidelines C. Any Time. Change management approval has not been granted.actualtests. This is an example of: A. separation of duties. The password risks disclosure of Personally Identifiable Information (PII). Port scanner "Pass Any Exam.www. Answer: A QUESTION NO: 141 A. Which of the following is the BEST reason for not allowing this? A. Damage and loss control D. C. It will require too much time to conduct due diligence. D. implicit deny. single sign on. Ping sweeper B.co m 42 . The proposed password does not meet complexity requirements. C.

ARP scanner Answer: B QUESTION NO: 143 A data entry technician uses an application from the Internet to gain administrative rights on a system. B. a logic bomb.com 43 Ac tua A. and these same workstations are executing DDOS attacks on remote systems. spyware. Spam B. Which of the following is suspected to be in the system? sts . Any Time. Logic bomb B.www. Gaining unauthorized domain rights is an example of: A. D. Virus D.actualtests. Answer: D QUESTION NO: 144 Answer: A QUESTION NO: 145 The network administrator has determined that a large number of corporate workstations on the network are connecting to an IRC server on the Internet.co m ." . Spyware C. Botnet C. Which of the following terms BEST describes this situation? A. C. Worm D. Rootkit "Pass Any Exam. privilege escalation. Trojan lTe The newly hired security administrator for a company suspects that the previous security administrator has maliciously left code to corrupt the logging systems in 30 days. arootkit. Networkmapper D.CompTIA SY0-201: Practice Exam C.

CompTIA SY0-201: Practice Exam Answer: B

QUESTION NO: 146 A system administrator wants to verify that the corporate users are following the security policy on password complexity requirements. Which of the following could be used to verify the passwords? A. Password hardening B. Password enumeration C. Password cracking D. Password hashing Answer: C

QUESTION NO: 147

Answer: A

QUESTION NO: 148

The IT department has been having issues lately with vulnerabilities occurring on the network due to outdated software on new computers that are deployed. Which of the following would be the BEST way for the administrator to address this issue? A. Ensure that all patches are installed by employees B. Implement group policies C. Establish configuration baselines for the images D. Build security templates for the OS Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. Penetration test B. Vulnerability scan C. Port scan D. Social engineering

sts

The director of security for a company needs to determine how the security and network administrators would respond to a compromised system. Which of the following would be the BEST way for the director to test the teams response?

.co

m

44

CompTIA SY0-201: Practice Exam QUESTION NO: 149 A web server that the employees use to fill out their time cards needs to be protected. The web server needs to be accessible to employees both inside the campus and at remote sites. Some of the employees use computers that do not belong to the company to do their work. Which of the following would BEST protect the server? A. Place the server in a DMZ and require all users to use the company's VPN software to access it. B. Place the server in a subnet that is blocked at the firewall. C. Place the server in a DMZ after hardening the OS. D. Require all users to use a PKI token stored on a physical smart card to authenticate to the server. Answer: C

QUESTION NO: 150

Answer: C

QUESTION NO: 151

An important file has been deleted off the departments file server. Management would like to know who was responsible for deleting the file. Which of the following log files can be used to inform management of the answer? A. The system logs on the server and then the access logs on the workstation. B. The application logs on the server and then the access logs on the workstation. C. The access logs on the server and then the access logs on the workstation. D. The access logs on the server and then the system logs on the workstation. Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. Installation of antivirus software on theusers workstation B. Updates and patching of the users workstation C. An account access and rights audit D. An audit of the security logs

sts

User A moved from Human Resources to Accounting. A year later they mistakenly print to a network printer back in HR. This indicates which of the following needs to happen?

.co

m

45

CompTIA SY0-201: Practice Exam QUESTION NO: 152 A user reports that they are seeing ads appear for sites that are not safe for work while they are reading blogs. Which of the following would be the BEST way to solve this issue? A. Install and configure a pop-up blocker on the workstation. B. Provide a second web browser for reading the blogs. C. Deploy HIDS to the workstation. D. Update the Acceptable Use Policy (AUP). Answer: A

QUESTION NO: 153 Management wants a security assessment conducted on their network. The assessment must be conducted during normal business hours without impacting users. Which of the following would BEST facilitate this? A. A risk assessment B. Ahoneynet C. A penetration test D. A vulnerability scan Answer: D

QUESTION NO: 154

A. Sales: Read=Allow; Write=Allow Everyone: Read=Allow; Write=None B. Sales: Read=Allow; Write=Allow Everyone: Read=Deny; Write=Deny C. Sales: Read=None; Write=Allow Everyone: Read=Allow; Write=Allow D. Sales: Read=Allow; Write=Allow Everyone: Read=None; Write= None Answer: A

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

A server needs to be configured to allow the sales department ability to read and write a file. Everyone else in the company only needs read access. Which of the following access control lists will do this?

tua

lTe

sts

.co

m

46

Due diligence Answer: A Explanation: Implicit deny means that the firewall only permits the specific needed applications to pass through the firewall. Network access control D.CompTIA SY0-201: Practice Exam QUESTION NO: 155 Which of the following tools would BEST allow a security administrator to view the contents of unencrypted network traffic? A. Implicit deny B. Subnetting B. and everything else is denied." . Least privilege C. which of the following methods provides the MOST secure starting point? A. Web application firewall B.actualtests. QUESTION NO: 158 "Pass Any Exam. Protocol analyzer C.co m A security administrator would use which of the following to control access between network segments? 47 . Firewall .www. NIDS C. RADIUS D. Honeypot Answer: B QUESTION NO: 156 When developing a new firewall policy. Any Time.com Ac tua QUESTION NO: 157 lTe Answer: D sts A. Stateful inspection D.

A retina and fingerprint scan D.co m . Cipher-text attack D. A security badge and a physical token C. Key management Answer: B Which of the following techniques embeds an encrypted message within the bits of an image file? A. Any Time. Baseline B." . Steganography Answer: D QUESTION NO: 161 Which of the following is required for an anomaly detection system to evaluate traffic properly? A. Protocol analyzer Answer: A "Pass Any Exam. Vulnerability assessment D. Loss control D. Service level agreement B. Cryptographic hashing B. A passphrase and PIN B. Change management C.www. A password and a PKI certificate Answer: D QUESTION NO: 159 Which of the following defines the process and accounting structure for handling system upgrades and modifications? A. Signature C.com 48 Ac tua lTe QUESTION NO: 160 sts .CompTIA SY0-201: Practice Exam Which of the following represents two factor authentication? A. Proxy avoidance C.actualtests.

Password crackers D. disaster recovery process. Which of the following should the technician perform NEXT? "Pass Any Exam. Cryptographic hashing C. Network mapping software B.www. Which of the following tools can the technician use? A. D." .co m 49 . Single sign-on D.actualtests. Answer: C QUESTION NO: 163 A rainbow table is used for which of the following? A. Any Time. Password cracking Answer: D A technician wants to make sure all users in the network are in compliance with company standards for login. vulnerability assessment process.CompTIA SY0-201: Practice Exam QUESTION NO: 162 Regression testing and deployment are part of the: A. B. C. Digital signatures C.com Ac tua QUESTION NO: 164 lTe sts . Protocol analysis B. patch management process. least privilege principle. Performance baselines Answer: C QUESTION NO: 165 The technician just finished bringing up a new server in a live environment.

Spoofing B. LDAP D. Proxy server D.actualtests. Antivirus C.co m 50 . Update group policies D. Firewall Answer: B QUESTION NO: 167 Which of the following tools will detect protocols that are in use? A. TACACS B. Install OS patches Answer: B QUESTION NO: 166 A user reports that after opening an email from someone they knew.CompTIA SY0-201: Practice Exam A. Which of the following software can the technician MOST likely install on the computer to mitigate this threat? A." .com Ac tua lTe sts .www. CHAP C. Performance baseline C. DMZ Answer: B QUESTION NO: 168 Which of the following uses a trusted third party key distribution center to generate authentication tokens? A. Port scanner C. Any Time. HIDS D. their computer is now displaying unwanted images. Anti-spam B. Install antivirus software B. Kerberos "Pass Any Exam.

AES128 Answer: C "Pass Any Exam. Symmetric D. and should be set so that there are always an odd number of 1s in every byte. Blowfish Answer: C QUESTION NO: 171 Which of the following uses multiple encryption keys to repeatedly encrypt its output? A. Asymmetric B. DES C. using a 64-bit key. resulting in a key length of 56 bits. so only the seven most significant bits of each byte are used. AES C. These parity bits are ignored. SHA B. Kerberos Answer: C QUESTION NO: 170 Which of the following standards encodes in 64-bit sections.actualtests. DES D. tua lTe sts . AES256 B.www.com Ac Explanation: DES encrypts and decrypts data in 64-bit blocks. Certificate based C.co m 51 . 56 of which are the encryption key? A. Any Time." .CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 169 Which of the following encryption methods is being used when both parties share the same secret key? A. The least significant (right-most) bit in each byte is a parity bit. although the effective key strength is only 56 bits. 3DES D.

Triple DES algorithm is very secure (major banks use it to protect valuable transactions). To analyze packets and frames B. TKIP C. It uses a 64-bit key consisting of 56 effective key bits and 8 parity bits. To enumerate and crack weak system passwords C." . To decrypt WEP traffic and keys Answer: A QUESTION NO: 173 Which of the following is MOST likely the reason why a security administrator would run a NMAP report on an important server? A.CompTIA SY0-201: Practice Exam Explanation: Triple DES is a variation of Data Encryption Standard (DES). To determine open ports and services D. WEP B.com 52 Ac tua lTe sts .actualtests.1x D. The size of the block for Triple-DES is 8 bytes.co m . 802. To identify vulnerabilities in available services C. 802. To correlate which MAC addresses are associated with a switch port B. To capture network packets for analysis Answer: C QUESTION NO: 174 Which of the following technologies requires encryption and authentication? A. To detect files that have been altered during downloads D. QUESTION NO: 172 Which of the following is MOST likely the reason why a security administrator would run a Wire shark report on an important server? A. The idea behind Triple DES is to improve the security of DES by applying DES encryption three times using three different keys. but it is also very slow. Any Time.www.11n Answer: C "Pass Any Exam. Triple-DES encrypts the data in 8-byte chunks.

www. Storage and retention Answer: C Identification is the process of verifying which of the following? A.com Ac QUESTION NO: 177 tua lTe sts . Adjust user access rights assignments Answer: A QUESTION NO: 176 An administrator believes a user has more access to a financial application than they should. The user or computer system B. User rights assignment D. Encrypting email transmissions D. Storage and retention policies B. The association of a user Answer: A QUESTION NO: 178 Which of the following processes describes identity proofing? "Pass Any Exam.CompTIA SY0-201: Practice Exam QUESTION NO: 175 An administrator is concerned about the amount of time it would take to investigate email that may be subject to inspection during legal proceedings. Server configuration policy C.actualtests. The uniquenessof a users token D. The users access level C. Group policy B. Which of the following could help limit the company's exposure and the time spent on these types of proceedings? A. Which of the following policies would this MOST likely violate? A.co m 53 ." . Decentralize email servers C. Any Time.

Answer: C "Pass Any Exam. retina scan. Password. B. Authentication to individual systems with a single authentication factor.actualtests. Access to multiple systems with a single authentication method. Two distinct items from each of the authentication factor groups. Fingerprint. password and a one-time token D. retina scan. Access control and identity verification B. Identification and authentication D. Two distinct items from distinct categories of authentication factor groups. Two distinct items from one of the authentication factor groups. D. password. B. Identification and non-repudiation C.CompTIA SY0-201: Practice Exam A." .www. Any Time. C. C. lTe Which of the following is an example of a single sign-on? sts . and a thumbprint C. and a hardware PKI token Answer: A QUESTION NO: 180 Answer: A QUESTION NO: 181 Which of the following BEST describes what users are required to provide in a two factor authentication system? A. PIN.com Ac tua A. The use of three factor authentication on single systems. PKI smartcard. D.co m 54 . Two distinct items they know from the same authentication factor group. Authentication and authorization Answer: C QUESTION NO: 179 Which of the following combinations of items would constitute a valid three factor authentication system? A. Access to individual systems with a single password. and a one-time token B.

PGP C. WEP B. Any Time.actualtests. AES sts . B. MD5 D. One is based on job function and the other on a set of approved instructions.com 55 Ac tua lTe A.www. TKIP B. 3DES D.co Which of the following cryptographic algorithms would be the MOST secure choice for encrypting email? m . Both are based on job title but rule based provides greater user flexibility. which of the following is considered the MOST resistant to physical eavesdropping methods? "Pass Any Exam." . Elliptic curve C. D. Both are based on local legal regulations but role based provides greater security. Answer: C QUESTION NO: 183 Answer: D QUESTION NO: 184 Which of the following cryptographic methods provides the STRONGEST security when implemented correctly? A. One is based on identity and the other on authentication. NTLM Answer: B QUESTION NO: 185 In general. C.CompTIA SY0-201: Practice Exam QUESTION NO: 182 Which of the following is the primary difference between role-based access control and rule-based access control? A.

co m . DDoS tua lTe Which of the following BEST describes the use of geographically distinct nodes to flood a site or sites with an overwhelming volume of network traffic? sts . D.www. A. C. Key registration B. B. "Pass Any Exam. Cell phones are used for P2P gaming. Coaxial cable B. even if the user destroys the key? A. Key escrow D. E. Spoofing B.com 56 Ac A. Encryption on cell phones is not always possible. Wireless access points C.actualtests. Public trust model Answer: C QUESTION NO: 187 Answer: D QUESTION NO: 188 Which of the following security concerns stem from the use of corporate resources on cell phones? (Select TWO). Cell phones are easily lost or stolen. Fiber optic cable D. Any Time. CAT5 network cable Answer: C QUESTION NO: 186 Which of the following stores information with a trusted agent to decrypt data at a later date.CompTIA SY0-201: Practice Exam A." . DoS C. MITM attacks are easy against cell phones. There is no antivirus software for cell phones. Recovery agent C. Replay D.

com 57 Ac tua lTe sts . and IP address B. Documentation of security vulnerabilities and policy gaps. server location. users should be placed into groups based on which of the following? A. Set the printer to standby mode after hours. C.co m . Any Time.CompTIA SY0-201: Practice Exam Answer: A. B. MAC. Documentation of network security settings. RBAC. Demonstrations of security vulnerabilities and flaws in policy implementation. Demonstrations of network capabilities and resiliency.actualtests. Concept of implicit deny. Restrict group membership to users who do not print often. D. Job rotation. Remove unnecessary users from groups with permissions to the resources. policy gaps and user errors. D.www. required access. and MAC Answer: B QUESTION NO: 192 An administrator wants to make sure that all users of a large domain are restricted from installing software.E QUESTION NO: 189 Which of the following best practices should be applied to print resources to enforce existing information assurance controls? A." . Concept of least privilege. C. and security role C. Answer: D QUESTION NO: 191 When managing user access to files and system resources with groups. printer location. Which of the following should MOST likely be done? "Pass Any Exam. B. Answer: D QUESTION NO: 190 Which of the following is performed when conducting a penetration test? A. and biometrics D. Ensure that all user groups have permission to all printers.

Disable Java on Internet browsers.co m 58 . Use software firewalls. A security policy template is implemented B. Enable Internet history monitoring Answer: A Which of the following would a technician implement to mitigate SQL injection security risks? A. Delete Internet history. A software firewall D.CompTIA SY0-201: Practice Exam A. Answer: A QUESTION NO: 195 Which of the following would allow an administrator to perform internal research on security threats and common viruses on multiple operating systems without risking contamination of the production environment? A.www." .actualtests. B. A honey pot Answer: C "Pass Any Exam. A security IP audit is completed C. A firewall C. Any Time. Enable cookie monitoring C. A proxy server B. A virtual workstation D. All workstations are rebuilt Answer: A QUESTION NO: 193 Which of the following would MOST likely monitor user web traffic? A. C. Use input validation. Administrative rights are manually removed D.com Ac tua lTe sts QUESTION NO: 194 . A VLAN B. D.

Implementing an ACL B. Setting up a PKI C.com Ac QUESTION NO: 198 tua Answer: C lTe A. Any Time. Now the user is unable to open old encrypted emails.actualtests. Certificate authority Answer: C QUESTION NO: 197 A security administrator wants to implement a more secure way to login to a VPN in addition to a username and password. Certificate revocation list B. Restore old public key from the RA sts ." .www. Implementing a single sign on process D. Setting up two VPNs Answer: B QUESTION NO: 199 "Pass Any Exam. Which of the following needs to be completed to resolve the issue? m 59 . Public key infrastructure C. Restore old private key from the RA D. Recovery agent D. Old encrypted email needs to be resent C. Revoke the new private key B. Which of the following is the MOST secure way to log in to a VPN? A. Which of the following should be implemented? A.co A user is issued a new smartcard that stores both their new private and public key.CompTIA SY0-201: Practice Exam QUESTION NO: 196 An administrator wants to implement disk encryption and wants to have a disaster recovery plan to decrypt data if the key is unknown.

Proxy server C. NIDS "Pass Any Exam. This is an example of which of the following? lTe sts . Antivirus software C. Intrusion detection system Answer: A QUESTION NO: 200 A user creates an archive of files that are sensitive and wants to ensure that no one else can access them. Protocol analyzer Answer: A QUESTION NO: 201 A." . Port scanner B.co m 60 . Password cracker B. Internet content filter B. Least privilege D.www. Firewall D. Job rotation Answer: B QUESTION NO: 202 Which of the following can assesses threats in non-encrypted traffic? A. Separation of duties C.com Ac tua A security manager decides to assign the daily responsibility of firewall and NIDS administration to different technicians. Which of the following could be used to assess the security of the archive? A. Any Time.actualtests. Port scanner C. Which of the following tools could be used? A. Anti-spyware software D.CompTIA SY0-201: Practice Exam A server administrator wants to do a vulnerability assessment on a server that is not on the production network to see if FTP is open. Implicit deny B.

SOCKS B. SMTP C. SYSLOG D. Antivirus Answer: D QUESTION NO: 205 Which of the following is MOST commonly implemented to transport network device logs to a logging server? A. HIDS C. SHTTP Answer: C "Pass Any Exam.com Ac tua lTe sts . The operating system vendor releases a solution quickly outside of its normal update cycle. Service pack C.www. Which of the following has the vendor released? A.CompTIA SY0-201: Practice Exam D. Firewall Answer: C QUESTION NO: 203 A security flaw in an operating system allows backdoor access into the system. Any Time." . Desktop firewall B. HIPS D. Patch Answer: C QUESTION NO: 204 Which of the following desktop solutions can a user implement to detect and delete downloaded malware? A. Hotfix D.co m 61 . Cookies B.actualtests.

Fail danger B. Time of day restrictions B. Acceptable use policy Answer: A QUESTION NO: 209 Organizational policy requiring employees to login using their username and password and a random number from their key fob is an example of: "Pass Any Exam.co m 62 .com Ac Which of the following access control methods prevents a user from accessing network resources after the end of the users typical shift? tua lTe sts . Group policy C. they began receiving unsolicited pop-ups on subsequent website visits. Spam Answer: C QUESTION NO: 207 Which of the following is the MOST secure condition a firewall should revert to when it is overloaded with network traffic? A. Trojan C. Password policy D.actualtests." . Virus B. Any Time. Fail open Answer: C QUESTION NO: 208 A.CompTIA SY0-201: Practice Exam QUESTION NO: 206 A user reports that after searching the Internet for office supplies and visiting one of the search engine results websites. Fail closed D. Which of the following is the MOST likely cause of the unsolicited pop-ups? A.www. Fail safe C. Adware D.

Single sign-on D. NTFS C. RSA D. three factor authentication. Any Time. Answer: A QUESTION NO: 211 Answer: B QUESTION NO: 212 A user is recording a file on disk.www.co m 63 . confidentiality. Answer: B QUESTION NO: 210 Organization policy requiring employees to display their corporate badge at all times is an example of: A. Biometric reader tua lTe A user wants to ensure that if a computer's hard drive is removed. four factor authentication." .actualtests. the files cannot be accessed without authentication. D. Digital signature B. authentication. D. C. Which of the following would be used? sts . Which of the following will allow a user to verify that the file is the original? A. 3DES B. C. identification. non-repudiation. two factor authentication. Disk encryption C. MD5 "Pass Any Exam. single factor authentication.com Ac A. B. B.CompTIA SY0-201: Practice Exam A.

Install wireless access points C. Replace the wireless access point B. Implement a password policy C. Change the SSID D. Which of the following can be used to mitigate threats from entering the network via this jack? A." . Any Time. Replace the firewall C.www. Enable MAC filtering B. Replace CAT5 with CAT6 plenum D. Enable MAC filtering Answer: D Which of the following can be implemented to mitigate the risks associated with open ports on a server? A. Disable ports when not in use B.com Ac QUESTION NO: 215 tua lTe sts . Disable network cards Answer: C QUESTION NO: 216 "Pass Any Exam. Which of the following can BEST be completed to mitigate the issue? A. Install a firewall Answer: A QUESTION NO: 214 A technician completes a WLAN audit and notices that a number of unknown devices are connected.co m 64 .actualtests. Disable unnecessary programs D.CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 213 A technician places a network jack in the parking garage for administrative use.

B. Cryptography "Pass Any Exam. C. Change the acceptable use policy. Edit the access control list. Makes it easier to implement a job rotation policy and cross train administrators. C.actualtests.CompTIA SY0-201: Practice Exam A small company wants to hire a security assessment team for the server and network infrastructure. D. Bandwidth requirements C. Any Time. Answer: C QUESTION NO: 218 A.co m 65 . Deploy a group policy." . Rules of engagement Answer: D QUESTION NO: 217 A technician wants to implement a change across the production domain. Vulnerability scan B. D. Protocols analysis D. Which of the following techniquesshould the technician perform? A. Compliance with these local legal regulations requires the security administrator to report data losses due to which of the following? A. Increasesadministrators skills by providing them with a vacation. B. Answer: B QUESTION NO: 219 A security administrator works for a corporation located in a state with strict data breach disclosure laws. Install service packs on the domain.com Ac tua Implementing a mandatory vacation policy for administrators is a security best practice because of which of the following? lTe sts . Which of the following needs to be defined before penetration testing occurs? A. Detects malicious actions by an administrator responsible for reviewing logs.www. Detects malicious actions by users with remote access to network resources.

a security administrator is helping to execute the company disaster recovery plan. Proper authorization procedures B. C." . Authentication mechanisms for guests. Auditing and logging of transactions. Hacking Answer: D QUESTION NO: 220 When investigating data breaches caused by possible malicious action. New user account creation services. Answer: A "Pass Any Exam. Help desk phones and staffing.www. Which of the following BEST describes what the CIRT is trying to document? A. Documenting all HDD serial numbers D. Backup corruption C.com Ac tua A.actualtests. Damage mitigation Answer: C QUESTION NO: 221 Answer: A QUESTION NO: 222 After a disaster. Which of the following security services should be restored FIRST? A. Any Time. Having system administrators electronically sign the plan C.co m 66 . Disaster recovery plan C. Chain of custody D. Executing the continuity plan at random lTe Proper planning for disaster recovery includes which of the following? sts . it is important for members of the CIRT to document the location of data at all times. Power failures D. Testing the plan on a regular basis B.CompTIA SY0-201: Practice Exam B. D. B.

Availability Answer: D QUESTION NO: 226 Which of the following is used to provide a fixed-size bit-string regardless of the size of the input source? "Pass Any Exam. Fully operational equipment and installed network equipment B. C. Confidentiality C.www.co m 67 .com Ac tua lTe sts A. Active network jacks D. hot site. primary site. Answer: A QUESTION NO: 224 Which of the following is provided at a cold site? Answer: D QUESTION NO: 225 A single point of failure is a security concern primarily because it affects which of the following? A. Cryptography B. cold site. D.CompTIA SY0-201: Practice Exam QUESTION NO: 223 The MOST expensive and effective alternate site that provides the HIGHEST level of availability.actualtests. warm site." . Any Time. New equipment ready to be installed . network connections and UPS C. B. is called a: A. Integrity D. Live redundant computers.

High raw storage capacity combined with wireless transfer capability. Provides a system for recovering encrypted data even if the users lose private keys C.co Answer: B m 68 . High volume and transfer speeds combined with ease of concealment. Provides a system for recovering encrypted data when public keys are corrupted D.CompTIA SY0-201: Practice Exam A. Ensures that all private keys are publicly accessible to PKI users B. Any Time. WEP Answer: A QUESTION NO: 227 Which of the following is the purpose of key escrow in a PKI system? A. Slow data transfer speeds combined with ease of concealment. SHA B. 3DES C. PGP D. D. B. Sender's public key D. Recipient's public key C. which of the following keys is used to sign outgoing messages? A." . C.actualtests.com Ac tua lTe sts QUESTION NO: 228 . Recipient's private key Answer: A QUESTION NO: 229 Which of the following BEST describes why USB storage devices present a security risk to the confidentiality of data? A. Sender's private key B.www. Ability to remotely installkeylogger software and bypass network routing. Ensures the security of public keys by storing the keys confidentially In a standard PKI implementation. Answer: C "Pass Any Exam.

www. Retina scan and palm print B. Performance baseline B. User password and user PIN ." . Smartcard and hardware token C.com 69 Ac tua lTe sts A. B.co m Which of the following is a valid two-factor authentication model? . Any Time. Iris scan and user password D. These rights are granted only to security administrators.actualtests. D. This policy is an example of which of the following industry best practices? A.CompTIA SY0-201: Practice Exam QUESTION NO: 230 Modern cell phones present a security risk to corporate networks because of which of the following? A. Answer: B QUESTION NO: 231 Answer: C QUESTION NO: 232 Which of the following would a security administrator be MOST likely to use if a computer is suspected of continually sending large amounts of sensitive data to an external host? A. C. Cell phones are vulnerable to logic bombs. It is difficult to push security policies to cell phones. Honeypot D. Cell phone signals interfere with fiber networks. Virus scanner C. Protocol analyzer Answer: D QUESTION NO: 233 The security policy at a company clearly specifies that server administrators cannot have access to log servers or permissions to review log files. Cell phones can be used to spread computer viruses. Separation of duties "Pass Any Exam.

Implicit deny Answer: A QUESTION NO: 234 Which of the following network security devices is the BEST to use when increasing the security of an entire network. Total complexity of the overall security architecture C.com Ac tua A." .CompTIA SY0-201: Practice Exam B. Which of the following is the administrator MOST likely using? A. Number of logical hosts providing services for users D.actualtests. Replay attack Answer: B "Pass Any Exam. HIDS D. Any Time. Honeypot B. Firewall C. Protocol analyzer C. Job rotation C. by preventing the transmission of malicious packets from known attacking sources? A. or network segment. Amount of application logging required for security lTe One of the primary purposes of virtualization in a data center is to reduce which of the following? sts . Port scanner B. Volume of physical equipment needing to be secured B. NIDS Answer: B QUESTION NO: 235 Answer: A QUESTION NO: 236 A security administrator reassembles the output of a captured TCP stream to diagnose problems with a web server.www.co m 70 . Privilege escalation D. Session hijacking D.

Answer: B QUESTION NO: 238 Which of the following ensures that an employee cannot continue carrying out fraudulent activities? A. 3389 D." .www.actualtests. Biometric reader B. Which of the following ports should the administrator change from its default to control this? m 71 . there have been an increased amount of failed remote desktop login attempts from an external IP address. Install application patches.CompTIA SY0-201: Practice Exam QUESTION NO: 237 A factory fresh install has just been completed on a computer. C. Job rotation C. Modify group policies.co In the past several weeks.com Ac QUESTION NO: 239 tua Answer: C lTe A. Install OS updates. Which of the following should be done FIRST once the computer is connected to the network? A. 4658 sts . B. Any Time. Two-factor authentication D. 25 C. Establish a baseline. 21 B. Role-based access control Answer: B QUESTION NO: 240 "Pass Any Exam. D.

Any Time. HIDS C. At a later date. RADIUS B.co m 72 . Logic bomb Answer: D QUESTION NO: 243 Which of the following is the MOST efficient way to secure a single laptop from an external attack? A. Rootkit D. RDP D. Pop-ups B.CompTIA SY0-201: Practice Exam Which of the following centralizes authentication on a wireless network? A. Adware Answer: D A. Which of the following has MOST likely infected the computer? A. Software firewall "Pass Any Exam. Spam C. Spyware C. Which of the following threats has MOST likely infected the computer? lTe QUESTION NO: 242 sts . several computers started behaving abnormally." . CHAP Answer: A QUESTION NO: 241 A user reports random windows opening and closing after installing new software.www. Worm B.actualtests. Spam D.com Ac tua A user reports that they opened an attachment from an email received through a distribution list. NIPS B. VPN C.

key management. P2P D. MD5 B. D. availability. TPM C. Hardware locks B. non-repudiation." . confidentiality. Hardware firewall Answer: C QUESTION NO: 244 From which of the following can a virus be loaded before an OS starts? A.CompTIA SY0-201: Practice Exam D. C. B. Answer: D QUESTION NO: 246 Which of the following allows the administrator to verify a file is the same as the original? A. 3DES Answer: A QUESTION NO: 247 Which of the following symmetric encryption algorithms provides the HIGHEST key strength? "Pass Any Exam. RSA C. USB drive Answer: D Using a digital signature during an online transaction is a form of: A.actualtests.com Ac tua lTe sts .www. Any Time. AES D.co QUESTION NO: 245 m 73 .

SSL/TLS B.1x Answer: C "Pass Any Exam.www. Thin client C. SSH tunneling C." . 802. USB drive D. AES D.com Ac A. Which of the following is the cause? sts . IPSec VPN connection B.actualtests. Certificate revocation list look-up D. Any Time. Digital signature C. Incorrect DNS setup tua lTe The firewall administrator sees an outbound connection on IP port 50 and UDP port 500. Elliptic curve B.co m 74 . RSA C. Secure SMTP D.CompTIA SY0-201: Practice Exam A. S/MIME Answer: D QUESTION NO: 249 Answer: A QUESTION NO: 250 Which of the following poses the GREATEST risk of data leakage? A. BIOS B. 3DES Answer: C QUESTION NO: 248 Which of the following protocols allows a user to selectively encrypt the contents of an email message at rest? A.

Open relay C.actualtests. Firewall "Pass Any Exam. Buffer overflow B. Any Time. Cross-site scripting C.co m 75 .CompTIA SY0-201: Practice Exam QUESTION NO: 251 Command-and-Control is a key element of a: A.www. botnet.com Ac tua QUESTION NO: 253 lTe sts . SMTP open relays D. D. Cross-site scripting Answer: B Which of the following is mitigated by implementing proper data validation? A. rootkit. Answer: D QUESTION NO: 252 Which of the following allows an attacker to use a company's email server to distribute spam? A. B. NIPS B. Instant messaging D. DNS poisoning Answer: B QUESTION NO: 254 Which of the following provides active protection to critical operating system files? A. logic bomb." . Rootkits B. C. trojan.

com Ac tua A. NIDS QUESTION NO: 256 Answer: B QUESTION NO: 257 Which of the following methods allows the administrator to create different user templates to comply with the principle of least privilege? A. Software firewall C. Rule-based access control B. HIDS B.CompTIA SY0-201: Practice Exam C. VM escape C.www. Mandatory access control C. HIDS Answer: C QUESTION NO: 255 Which of the following can restrict a computer from receiving network traffic? A. VM cluster B." . Role-based access control Answer: D "Pass Any Exam.actualtests. VM hypervisor D. Antivirus D.co m Answer: B 76 . Any Time. HIPS D. VM hardware abstraction lTe sts Which of the following BEST describes when code that is initiated on a virtual machine directly affects the host? . Physical access control D.

project management. C." . senior management. Which of the following should the administrator do FIRST? A. Answer: D QUESTION NO: 261 Which of the following RAID types would be implemented for disk mirroring? A. Install UPS units on each critical device B. Use multiple servers for redundancy Answer: C QUESTION NO: 259 A new software application is designed to interact with the company's proprietary devices.co m . Consult the firewall logs for blocked process threads or port communication. Ensure that the software is compliant to the system's host OS. C. human resources. Systems where the software is installed can no longer connect to the devices. contractors. Check the antivirus definitions for false positives caused by the new software. Verify that the devices are not rogue machines and blocked by network policy. B.www. Install backup generators D. Any Time. D. D.com 77 Ac The success of a user security education and awareness plan is largely dependent on support from: tua lTe sts . B. Answer: B QUESTION NO: 260 A. RAID 0 "Pass Any Exam. Implement a SONET ring C.actualtests.CompTIA SY0-201: Practice Exam QUESTION NO: 258 Which of the following would be the BEST course of action to maintain network availability during an extended power outage? A.

False negatives Answer: A QUESTION NO: 265 "Pass Any Exam.www. RAID 5 Answer: B QUESTION NO: 262 Which of the following should be protected from disclosure? A.com Ac tua lTe sts . Public key infrastructure Answer: B QUESTION NO: 263 Which of the following would be used to send an encrypted email? A. SSH C. RAID 1 C. True negatives C. Certificate revocation list B. False positives B. PPTP D. True positives D.co m 78 .CompTIA SY0-201: Practice Exam B. User's private key passphrase C. User's public key D. RAID 3 D.actualtests." . S/MIME Answer: D QUESTION NO: 264 Which of the following is of the GREATEST concern when using a biometric reader? A. LT2P B. Any Time.

Any Time." . removing the public key. Backup generator tua Which of the following technologies will ensure the datacenter remains operational until backup power can be obtained? lTe QUESTION NO: 267 sts .actualtests. Privacy policy C. Personal software firewall Answer: C QUESTION NO: 266 In which of the following would a user find a list of activities which are prohibited when connecting to a corporate network? A.www.CompTIA SY0-201: Practice Exam Which of the following can be implemented to prevent malicious code from executing? A. B. Transfer switch C. Circuit breaker D.com Ac A. Network procedures B. Acceptable use policy D. Anti-spam software C. "Pass Any Exam. Hardware firewall B. removing the private key.co m 79 . Due diligence Answer: C Answer: A QUESTION NO: 268 Key escrow is the process of: A. C. Antivirus software D. entrusting the keys to a third party. D. backing up the key to local storage. UPS B.

Public key C.actualtests. DES D. Any Time. HTTPS D. One of the proposed methods of dealing with key escrow involves the storage of key information with a third party. referred to as a key escrow agency . Shared key Answer: C Answer: D QUESTION NO: 271 Which of the following can be used to create a unique identifier for an executable file? A. SHA Answer: D "Pass Any Exam.CompTIA SY0-201: Practice Exam Answer: A Explanation: A key escrow system stores keys for the purpose of law enforcement access. QUESTION NO: 269 In PKI. which of the following keys should be kept secret at all times? A. Diffie-Hellman key B.com Ac tua A. Privatekey D." . SNMP B.www. Blowfish B.co m 80 . NTLM C. IPSec lTe Which of the following protocols is used to connect a remote office LAN into the central office so resources can be shared? sts QUESTION NO: 270 . SSH C.

Availability B.actualtests. HIDS C. Session cookie handling C. Personal firewall Answer: B QUESTION NO: 275 Which of the following should a web application programmer implement to avoid SQL injection attacks? A.CompTIA SY0-201: Practice Exam QUESTION NO: 272 Which of the following is achieved and ensured by digitally signing an email? A. Integrity Answer: D QUESTION NO: 273 Which of the following behavioral biometric authentication models should a technician deploy in a secure datacenter? A. Voice recognition B. Anti-spam D. Fingerprint recognition C. Encryption and hashing B.com 81 Ac tua lTe sts . Any Time. Iris scan D.www. NIDS B. Retina scan Answer: A QUESTION NO: 274 Which of the following is able to detect that a local system has been compromised? A. Confidentiality C. Delivery D. Authentication and authorization "Pass Any Exam.co m ." .

Logic bomb Answer: A. Which of the following could have been implemented to prevent this situation? A.actualtests. parameterized statements must be used (preferred). A user lost their key and the technicians do not have a copy of the key. Cross-site scripting E. To update the employee directory with new offices and phone numbers Answer: B QUESTION NO: 278 A company's laptops use whole disk encryption to encrypt their hard drives. Proper input validation Answer: D Explanation: To protect against SQL injection. Web load balancing D. SQL injection B. Key escrow "Pass Any Exam." . To disable the accounts of employees who have move to a different department D. To immediately create accounts for new employees B.co m 82 . A.CompTIA SY0-201: Practice Exam D. QUESTION NO: 276 Which of the following is MOST likely to occur if the input of a web form is not properly sanitized? (Select TWO). Backendfile system crash C.D QUESTION NO: 277 A. This resulted in the user losing all the data on their hard drive. Any Time. user input must not directly be embedded in SQL statements. or user input must be carefully escaped or filtered. To ensure all users have the appropriate access C.com Ac tua Which of the following is the BEST reason why a security administrator should periodically get a list of current employees and positions from the Human Resource department? lTe sts .www. Instead.

CompTIA SY0-201: Practice Exam B. Cold site C. Live site tua lTe A company is looking for the lowest cost option for their disaster recovery operations. Hot site D.com 83 Ac A. The executive user group has full control of the same network share. B. Which of the following BEST describes the user's permissions on the share? A. The user is able to modify. Trusted Platform Module (TPM) C. Digital signatures D.actualtests.co m . Deploy service packs. The user is able to write and read documents in the network share.www. D. Warm site B. C. C. Deploy ahotfix. Which of the following would be BEST suited for their needs? sts QUESTION NO: 280 . A user is a member of both groups. The user is able to modify. regardless of the amount of time it will take to bring their systems back online. Deploy a group policy. Answer: D Answer: B QUESTION NO: 281 The technical user group has read and writes access to a network share. The user is able to modify and write documents in network share. B. "Pass Any Exam. Non-repudiation Answer: A QUESTION NO: 279 The network administrator has been asked to turn off access to the command prompt for some users. Deploy patches. write. Which of the following is the BEST choice to complete this request? A. D. write and delete documents in network share. Any Time." . delete and read documents in network share.

it is discovered the network administrators have no clear timeline of when patches must be installed. Nmap Answer: C.E QUESTION NO: 283 Answer: A Explanation: John the Ripper is a fast password cracker." . QUESTION NO: 284 During an annual risk assessment. Creating and disseminating a patch management policy B. Training network administrators on the importance of patching D. Which of the following security tools can be used to conduct this scan? (Select TWO). OVAL D. Its primary purpose is to detect weak Unix passwords. Any Time. nslookup E. DOS. Metasploit C.actualtests.CompTIA SY0-201: Practice Exam Answer: A QUESTION NO: 282 A penetration tester is required to conduct a port scan on a network.www. John the Ripper B. Win32. Which of the following would BEST solve this issue? A. and OpenVMS. Report the issue to management and revisit it during the next risk assessment C. Snort C.com 84 Ac tua lTe A. A. Kismet B. currently available for many flavors of Unix (11 are officially supported. netcat D. BeOS. Which of the following tools would be BEST suited to this task? . not counting different architectures).co m . Milw0rm sts A penetration tester is attempting to run a brute-force attack to discover network passwords. Hiring more administrators to better assist in the patching of servers "Pass Any Exam.

Single factor B. Personal software firewall C.F . Any Time.com 85 Ac tua lTe A.CompTIA SY0-201: Practice Exam Answer: A QUESTION NO: 285 Which of the following security applications would be MOST useful to traveling employees? (Select THREE).www. Vulnerability scanner Answer: D QUESTION NO: 288 "Pass Any Exam. NIPS F.co m Answer: A. Protocol analyzer C. External corporate firewall E. NIDS D. Password cracker B.B. Antivirus QUESTION NO: 286 Answer: A QUESTION NO: 287 Which of the following tools is MOST commonly used to assess a system's network for a security audit? A. Physical security control D. A. Anti-spam B. Physical tokens D.actualtests. Three factor C." . Two factor sts Which of the following authentication models is the MOST vulnerable to password crackers? .

actualtests. Which of the following MOST likely occurred? A.www. The technician is unable to remotely control the computer and realizes that they no longer have administrative rights to that workstation. Any Time. Spyware B." . Performance monitors were analyzing the network traffic and took the system offline. Software firewall Answer: A QUESTION NO: 290 A. B. Which of the following is MOST likely the cause? "Pass Any Exam. which resulted in the company's website going offline. C. Which of the following BEST describes attack type? lTe sts . which of the following should be used? A.CompTIA SY0-201: Practice Exam A third party conducted an assessment of a company's network.com Ac tua A user reports a problem with resetting a password on the company website. Vulnerability scanners took the system offline. The help desk determined the user was redirected to a fraudulent website. Password crackers were used and took the system offline. HIDS B. Group policies C.co m 86 . D. NIDS D. XSS C. Penetration testing took the system offline. Logic bomb Answer: B QUESTION NO: 291 A user reports that their system is slow and reboots on its own. Worm D. Answer: A QUESTION NO: 289 In order to closely monitor and detect suspicious activity on a single server.

p. The computer is MOST likely the victim of which of the following security threats? A. Any Time. A technician checks the computer and realizes that it is sending out spam messages throughout the company. Updated antivirus software B.com Ac A. Rootkit Answer: D QUESTION NO: 292 A user can no longer access the Internet from their laptop. Spam B. Which of the following solutions would be the BEST choice? lTe sts .CompTIA SY0-201: Practice Exam A. Personal firewall D." . Reference: CompTIA Secutiy + Deluxe Study Guide. but those workstations need to be able to access any Internet site. DDoS C. DOS Answer: B QUESTION NO: 293 Answer: A Explanation: The best initial protection against malicious code is antivirus software.www. XSS D. Virus B.co m 87 . Pop-up blockers C. 492. Botnet C. Updated anti-spam software tua An administrator is required to keep certain workstations free of malware at all times.actualtests. Adware D. QUESTION NO: 294 Which of the following security applications is used to mitigate malware? "Pass Any Exam.

Anti-spam D. Perform a query every 60 days to identify those computers and disable them all at once. Encryption devices B. Add the user to the correct security group B. These computers are for a class that is conducted every three months. Networkmapper D. Add the user to the correct distribution group tua lTe A user reports that they can no longer access the accounting share drive.www.co m . Give that specific user rights to the shared drive C.CompTIA SY0-201: Practice Exam A." . Which of the following is the BEST solution? A. That user was moved to the Finance department but still needs access to the accounting share drive. Honeypots C. B. "Pass Any Exam.actualtests. Add those computers to a special group and set group policy to disable all computers within that group. HIDS Answer: A QUESTION NO: 295 Which of the following could be used to gather evidence against an attacker? A. Internet content filter Answer: B Answer: A QUESTION NO: 297 A few computers have been off the network for 70 days and a new company policy dictates that all computers that are not on the network for over 60 days need to be disabled.com 88 Ac A. Provide the user with full access rights to that shared drive D. Personal firewall C. Any Time. Anti-spyware B. Which of the following actions should an administrator MOST likely do? sts QUESTION NO: 296 .

Domain wide password policy C.actualtests. SQL injection B. Disable each computer as it reaches 60 days. Storage and retention policy D. User access and rights tua lTe Which of the following audit types would a security administrator perform on the network to ensure each workstation is standardized? sts . Add those computers to a special group and perform a query every 45 days to identify additional computers.com Ac A. Brute force C. D. Protocol analyzer Answer: D QUESTION NO: 299 Answer: A QUESTION NO: 300 Which of the following audit systems should be enabled in order to audit user access and be able to know who is trying to access critical systems? A. Answer: B QUESTION NO: 298 Which of the following would a security administrator use to perform vulnerability scanning without doing any penetration testing? A. Password policy D. Logic bombs D." . Group policy B. Group policy B.CompTIA SY0-201: Practice Exam C.co m 89 . Account expiration C. Any Time.www. Failed logon attempts "Pass Any Exam. perform queries every 30 days to identify those computers.

Patch C." . Worm D.co m 90 . Antivirus server B.actualtests. Any Time.www.com Ac tua lTe sts .CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 301 Which of the following system types would a security administrator need to implement in order to detect and mitigate behavior-based activity on the network? A. Group policy Answer: A QUESTION NO: 304 Which of the following is used to both deploy and reapply baseline security configurations? "Pass Any Exam. NIPS C. Trojan B. Botnet C. NIDS Answer: B QUESTION NO: 302 Which of the following is MOST often used in a DDoS? A. Hotfix D. Signature-based security devices D. Virus Answer: B QUESTION NO: 303 Which of the following would an administrator MOST likely update after deploying a service pack? A. Configuration baseline B.

Security agent C.actualtests. Use the most privilege rule to grant access to senior users. D. C. Any Time.CompTIA SY0-201: Practice Exam A. TACACS B. TACACS Answer: B QUESTION NO: 306 Answer: B QUESTION NO: 307 Which of the following is a best practice for managing user accounts? A. Notify account administrators when a user leaves or transfers.co m 91 . Performance baseline B.www. Networkmapper D. Protocol analyzer B. B. OVAL C. Vulnerability scanner lTe Which of the following was created to standardize the security assessment process? sts .com Ac tua A. Answer: A "Pass Any Exam. Port scanner D. Security template D. Configuration baseline Answer: C QUESTION NO: 305 Which of the following tools is used to report a wide range of security and configuration problems on a network? A. Vulnerability scanner C. Assign users to all groups in order to avoid access problems." . Lock out user accounts while the user is on extended leave.

C. Patch management D." . Updating domain password policies Answer: A QUESTION NO: 310 The BEST way to protect data-at-rest from an attacker is: A. User account creation and management C.com Ac tua lTe sts .www. One time pad D. Blowfish "Pass Any Exam. Block cipher B.CompTIA SY0-201: Practice Exam QUESTION NO: 308 Assigning access on a need-to-knows basis is a best practice in which of the following controls? A. D.co m 92 . B. secure network protocols. 3DES C. Vulnerability assessment Answer: B QUESTION NO: 309 Which of the following activities often involves consulting with the legal department? A. strong authentication. Reviewing storage and retention policies B. restricting read permission. Answer: D QUESTION NO: 311 Which of the following offers the MOST difficult to break encryption? A. whole disk encryption. Account management C. Network infrastructure planning D. Any Time. Risk assessment B.actualtests.

DMZ B.www. VLAN D.E 93 .com Ac tua A. B. the need for increased bandwidth availability. denial-of-service conditions. E. QUESTION NO: 313 Answer: D QUESTION NO: 314 A network administrator places a firewall between a file server and the public Internet and another firewall between the file server and the company's internal servers. NAT Answer: A "Pass Any Exam. lTe sts System resource monitors and baselines on web servers should be used by security team members to detect: . expired accounts in use. C. breed complacency among users for all certificate warnings.co m Answer: C. D. frequently fails to renew its certificates. Any Time. Subnetting C. A. This is an example of which of the following design elements? A." . increase resources used by the company's web-servers. expose traffic sent between the server and the user's computer. These failures: (Select TWO). C. new server policies. D. accessible publicly but only to company employees. resulting in expired certificate warnings for users. permit man-in-the-middle attacks to stealusers credentials.CompTIA SY0-201: Practice Exam Answer: C QUESTION NO: 312 A secure company portal. B. are irritating to the user but the traffic remains encrypted.actualtests.

" .com 94 Ac tua lTe sts . 1357acef246.www. as soon as the Configuration Control Board is alerted and begins tracking the changes.com). Domain name kiting B. Digital signature algorithm B. ARP poisoning C. Symmetric key cryptography B. Answer: A QUESTION NO: 316 Logs from a company's DNS server show requests from a remote ISPs DNS server for random sequences of characters as non-existent sub-domains to the legitimate domain name (e. after vetting in a test environment that mirrors the production environment. Digital signatures D.co m . after baselines of the affected systemsare recorded for future comparison. C. B. D. Advanced encryption standard "Pass Any Exam.g. TCP/IP hijacking Answer: C QUESTION NO: 317 Integrity is BEST provided by which of the following technologies? A. DNS poisoning D.CompTIA SY0-201: Practice Exam QUESTION NO: 315 Patches and updates should be applied to production systems: A. These logs MOST likely suggest the possibility of which of the following attacks? A.company. Asymmetric key cryptography Answer: C QUESTION NO: 318 Which of the following technologies address key management? A. Any Time.actualtests. as soon as the vendor tests and makes the patch available. Whole disk encryption C.

Protocol analyzer C.CompTIA SY0-201: Practice Exam C. LDAP entry D. Group policy C. Port scanner Answer: A QUESTION NO: 320 Which of the following tools depends MOST heavily on regular updates to remain effective? A. Antivirus Answer: A QUESTION NO: 322 "Pass Any Exam. Protocol analyzer D. Password cracker B." . Networkmapper D. standalone machine with no network interface to verify its overall security posture? A.com Ac tua lTe sts . Baseline B. Any Time.actualtests. Blowfish D. Diffie-Hellman Answer: D QUESTION NO: 319 Which of the following would be MOST useful for a security technician to run on a single. Networkmapper B.co m 95 .www. Vulnerability scanner Answer: D QUESTION NO: 321 Which of the following should be updated whenever software is upgraded on a production system? A. Port scanner C.

" . IPSec D.com Ac tua lTe QUESTION NO: 324 sts .www. SSH B. Any Time. Input validation Answer: A QUESTION NO: 323 Which of the following is considered the MOST secure replacement for telnet? A. Reverse proxies D. Field site "Pass Any Exam. Warm site D. Removing default accounts C. L2TP C. Hot site B. SSL Answer: A Which of the following is MOST closely associated with email? A.actualtests. TLS Answer: C QUESTION NO: 325 Which of the following redundancy planning concepts would MOST likely be used when trying to strike a balance between cost and recovery time? A. S/MIME D.CompTIA SY0-201: Practice Exam On network devices where strong passwords cannot be enforced. the risk of weak passwords is BEST mitigated through the use of which of the following? A.co m 96 . Cold site C. Limited logon attempts B. IPSec C. SSH B.

CompTIA SY0-201: Practice Exam Answer: C QUESTION NO: 326 Which of the following redundancy planning concepts is generally the LEAST expensive? A. Placing shielding on one side of a wireless router C.com Ac tua lTe sts A. Redundant servers . Hot site C. Turning off the SSID broadcast on the wireless router B. Any Time. Warm site B. Cold site Answer: D QUESTION NO: 327 Answer: C QUESTION NO: 328 Which of the following is a mitigation technique that addresses signal emanation? A." . Installing a WIDS in addition to the wireless router Answer: B QUESTION NO: 329 Which of the following would be used to observe a runaway process? A. Mobile site D. Volt meter C.co Which of the following is BEST used for providing protection against power fluctuation? m 97 .actualtests. UPS D. Configuring WPA instead of WEP on the wireless router D. Performance monitor "Pass Any Exam. Generator B.www.

Deny file access D. Department and salary divisions D. Deny network logon Answer: B "Pass Any Exam.CompTIA SY0-201: Practice Exam B." . Any Time. Video surveillance Answer: A QUESTION NO: 331 Which of the following is a best practice when creating groups of user and computer accounts in a directory service? A. Protocol analyzer D.actualtests. Delegation of administration and policy deployment B. Application log Answer: A QUESTION NO: 330 Which of the following might be referenced to determine if a server is functioning abnormally? A.com Ac tua lTe sts . Seniority at the company and access level Answer: A QUESTION NO: 332 Which of the following is a best practice relating to non-administrative user rights on a server? A. Protocol analyzer D.www. Chain of custody C. Performance baseline B.co m 98 . Deny printer access B. Performance baseline C. Naming conventions and technical aptitude C. Deny local logon C.

CompTIA SY0-201: Practice Exam QUESTION NO: 333 Which of the following security attacks would be MOST likely to occur within the office without the use of technological tools? A. Phishing B. Cold calling C. Shoulder surfing D. SPIM Answer: C Explanation: One form of social engineering is known as shoulder surfing and involves nothing more than watching someone when they enter their sensitive data. They can see you entering a password, typing in a credit card number, or entering any other pertinent information. The best defense against this type of attack is simply to survey your environment before entering personal data.

QUESTION NO: 334

Which of the following environmental controls would require a thermostat within the datacenter?

Answer: C

QUESTION NO: 335

Which of the following encryption implementations would be the MOST secure? A. 3DES B. WEP C. SHA1 D. MD4 Answer: A

QUESTION NO: 336

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. Air flow control B. Moisture control C. Temperature control D. Fire suppression

sts

.co

m

99

CompTIA SY0-201: Practice Exam Which of the following key types would a user MOST likely receive from a secure e-commerce website? A. Privatekey B. Public key C. CRL D. Key escrow Answer: B

QUESTION NO: 337 If a user lost their private key, which of the following actions would an administrator need to take? A. Use a recovery agent B. Obtain a public key C. Redesign the PKI D. Purchase a new CA Answer: A

Answer: D

QUESTION NO: 339 Which of the following signature-based monitoring systems is used to detect and remove known worms and Trojans on a host? A. NIPS B. Antivirus C. Anti-spam

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

A. Access logs B. IDS C. Performance logs D. DNS record

tua

Which of the following is used to verify if internal web servers are redirecting traffic to a malicious site?

lTe

QUESTION NO: 338

sts

.co

m

100

CompTIA SY0-201: Practice Exam D. HIDS Answer: B

QUESTION NO: 340 Which of the following describes the characteristic of an anomaly-based IDS? A. Sending an alert when suspicious activity has been prevented from entering the network. B. Sending an alert only when a pre-specified pattern is observed. C. Detecting traffic for specific patterns of misuse and sending an alert for each incident. D. Comparing traffic and sending an alert when it differs from historical patterns. Answer: D

Answer: C

QUESTION NO: 342

A new application support technician is unable to install a new approved security application on a departments workstation. The security administrator needs to do which of the following? A. Add that user to the local power users group B. Add that user to the domain administrators group C. Add that user to the domain remote desktop group D. Add that user to the security distribution group Answer: A

QUESTION NO: 343

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. Man traps B. Chain of custody C. Video surveillance D. Vulnerability scanners

sts

Which of the following security controls would a company use to verify that their confidential and proprietary data is not being removed?

.co

QUESTION NO: 341

m

101

Which of the following is MOST likely the cause? A. Job rotation B. PGP D. The administrator needs to be added to the webservers administration group." . Least privilege C. Any Time. which of the following best practices should MOST likely be in place? A. CA B. AES256 Answer: C QUESTION NO: 345 In order for an organization to be successful in preventing fraud from occurring by a disgruntled employee.www.actualtests. Username and password B. C. D. Access controls Answer: A QUESTION NO: 346 Which of the following authentication methods is the MOST expensive to implement? A. Answer: B QUESTION NO: 344 Which of the following uses both private and public key algorithms for email encryption and decryption? A. The administrator does not have the correct access rights to dial in remotely. Access Control List (ACL) "Pass Any Exam.CompTIA SY0-201: Practice Exam A remote network administrator calls the helpdesk reporting that they are able to connect via VPN but are unable to make any changes to the internal web server. IPSec needs to be reinstalled on the administrator's workstation. Separation of duties D. DES C. B.com Ac tua lTe sts .co m 102 . The VPN concentrator needs to be configured.

Cost of mitigation outweighs the risk D. Domain password policy Answer: C QUESTION NO: 350 "Pass Any Exam. Mandatory access control D. The potential impact of the risk is easily mitigated Answer: C QUESTION NO: 348 Most mission impacting vulnerabilities in a formal risk assessment should be: A. mitigated. Biometric reader Answer: D QUESTION NO: 347 In evaluating risk assessments. B.actualtests. ignored.www. C. Discretionary access control C. Physical security measures will take weeks to install C. Complexity of fixing the vulnerability B. Any Time. Group policies D. D.CompTIA SY0-201: Practice Exam C. accepted.co m 103 . avoided." . senior level managers would MOST likely accept a risk based on which of the following reasons? A. Biometrics B. Answer: C QUESTION NO: 349 A SQL database MOST likely implements which of the following access security mechanisms? A.com Ac tua lTe sts .

Which of the following would be the BEST way to meet their request without attempting to exploit those risks? "Pass Any Exam. It consists of a language.com 104 Ac tua lTe Explanation: The Open Vulnerability and Assessment Language (OVAL) is a community standard written in XML that strives to promote open and publicly available security content.CompTIA SY0-201: Practice Exam Rule-based access control is closely aligned with which of the following? A. Access control lists C. Mandatory access control B. RADIUS B. Certificate authority C.www. RADIUS Answer: C QUESTION NO: 353 Management has requested increased visibility into how threats might affect their organization. OVAL D. Any Time. Nessus D. Role-based access control D. sts .actualtests. TACACS Answer: C QUESTION NO: 352 Which of the following security tools can be used for vulnerability scanning? A. Milw0rm C. interpreter. Implicit deny Answer: A QUESTION NO: 351 Which of the following standards could be used to rate the risk exposure of vulnerabilities on a network? A. L0phtcrack B. and repository and is meant to standardize information between security tools." .co m .

CompTIA SY0-201: Practice Exam A. and modifying any accounts on the system. Conduct a security awareness seminar." . creating local user accounts. Kismet C. creating local user accounts. and modifying any accounts on the domain. Upgrading the operating system.com 105 Ac tua lTe Which of the following actions is an employee able to take if they are given administrative access to a workstation? sts . B.actualtests. Netstumbler Answer: B QUESTION NO: 355 A. Conduct a penetration test. creating local user accounts. D. NMAP B. C. Password protection which destroys data on the device after 12 incorrect attempts "Pass Any Exam. and modifying accounts on the network. Any Time. Answer: B QUESTION NO: 356 A user loses a USB device containing credit card numbers. and modifying accounts they created. Installing applications. D. RADIUS D. Which of the following would BEST protect the data? A. Upgrading the operating system.co m . Answer: B QUESTION NO: 354 Which of the following security tools can view the SSIDs of wireless networks even when they have SSID broadcasting disabled? A. Installing applications on remote systems. creating local user accounts. B.www. C. Encryption of the device with the key stored elsewhere B. Conduct a risk assessment. Conduct a social engineering test.

Encryption of the laptop to which the device is connected Answer: A QUESTION NO: 357 Which of the following algorithms provides the LOWEST level of encryption? A. AES C. RSA B. Any Time.com Ac tua lTe A.www. Password protection which destroys data on the device after 10 incorrect attempts D. Elliptic curve Answer: A QUESTION NO: 360 "Pass Any Exam. DES D. IPSec D." . MD5 B.actualtests. AES QUESTION NO: 358 Answer: A QUESTION NO: 359 Which of the following relies on prime numbers to generate keys? A.CompTIA SY0-201: Practice Exam C. Blowfish C. NTLM C. SHA1 B.co m Answer: C 106 . LANMAN sts Which of the following can ensure the integrity of email? . Blowfish D.

CompTIA SY0-201: Practice Exam Which of the following, if implemented on a server, will ensure availability if half of the drives fail? A. RAID 0 B. RAID 1 C. RAID 3 D. RAID 5 Answer: B Explanation: RAID level 1 RAID 1 is disk mirroring. Disk mirroring provides 100 percent redundancy because everything is stored on two disks. If one disk fails, another disk continues to operate. The failed disk can be replaced, and the RAID 1 array can be regenerated

Answer: B

QUESTION NO: 362

An administrator needs to implement a backup strategy that provides the fastest recovery in case of data corruption. Which of the following should the administrator implement? A. Full backup on Sunday and differential backups every other day B. Full backup on Sunday and incremental backups every other day C. Full backup on Sunday and a full backup every day D. Full backup on Sunday and alternating differential and incremental every other day Answer: C

QUESTION NO: 363 After deploying a new IDS, an administrator notices a large amount of notifications coming from a filter inspecting port 445. Which of the following can BEST help the administrator in determining if "Pass Any Exam. Any Time." - www.actualtests.com 107

Ac

tua

lTe

A. Restore a random file. B. Perform a full restore. C. Read the first 512 bytes of the tape. D. Read the last 512 bytes of the tape.

sts

.co

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

m

QUESTION NO: 361

CompTIA SY0-201: Practice Exam the notifications are false positives? A. Firewall log B. Protocol analyzer C. IDS performance monitor D. The router tables Answer: B

QUESTION NO: 364 At midnight on January 1st, an administrator receives an alert from the system monitoring the servers in the datacenter. All servers are unreachable. Which of the following is MOST likely to have caused the DOS? A. Rootkit B. Virus C. Logic bomb D. Botnet Answer: C

Which of the following is the MAIN difference between bluejacking and bluesnarfing? A. Bluesnarfing can be done from a greater distance than bluejacking. B. Bluejacking involves sending unsolicited messages to a phone while bluesnarfing involves accessing the phone data. C. Bluejacking involves some social engineering while bluesnarfing does not. D. Bluesnarfing involves sending unsolicited messages to a phone while bluejacking involves accessing the phone data. Answer: B

QUESTION NO: 366 "Pass Any Exam. Any Time." - www.actualtests.com 108

Ac

QUESTION NO: 365

tua

lTe

Explanation: Logic bombs are programs or snippets of code that execute when a certain predefined event occurs. Logic bombs may also be set to go off on a certain date or when a specified set of circumstances occurs.

sts

.co

m

CompTIA SY0-201: Practice Exam Which of the following is an email attack targeted at a specific individual to trick the individual into revealing personal information? A. Spear phishing B. Phishing C. Hoax D. Pharming Answer: A

QUESTION NO: 367 Which of the following attacks can be mitigated by shredding confidential documents? A. Hoax B. Shoulder surfing C. Dumpster diving D. Phishing Answer: C

Which of the following should an HVAC system do when a fire is detected in a data center? A. It should increase humidity. B. It should change to full cooling. C. It should decrease humidity. D. It should shut down. Answer: D

QUESTION NO: 369 Which of the following security concepts is supported by HVAC systems? A. Availability B. Integrity C. Confidentiality D. Privacy Answer: A "Pass Any Exam. Any Time." - www.actualtests.com 109

Ac

tua

lTe

QUESTION NO: 368

sts

.co

m

Worm Answer: C Which of the following should be implemented to mitigate the security threat of adware? A.co m 110 .CompTIA SY0-201: Practice Exam QUESTION NO: 370 Which of the following security concepts is supported by shielding? A.actualtests. Antivirus C. Reliability Answer: A QUESTION NO: 371 Which of the following system security threats negatively affects confidentiality? A. Pop-up blockers Answer: D QUESTION NO: 373 Which of the following concepts is applied when a user enters a password to gain authorized access to a system? A. Adware C. Spam B.com Ac tua QUESTION NO: 372 lTe sts . Identification "Pass Any Exam. Portability C." . Subnetting D.www. Confidentiality B. Spyware D. Availability D. Any Time. Anti-spam B.

Plug it in to a computer to see who it belongs to. B. NIPS D. Privatization C. Call the manufacturer of the USB device.co m 111 .com Ac tua lTe sts . D. Any Time. Answer: C QUESTION NO: 375 Which of the following security applications would an administrator use to help reduce the amount of bandwidth used by web browsing? A. Smaller routing tables D. Personal software firewall Answer: B QUESTION NO: 376 Which of the following BEST describes a reason to implement virtualization technology? A. Turn it in to the appropriate security person. Non-repudiation Answer: C QUESTION NO: 374 Which of the following should be done if a USB device is found in a parking lot? A.actualtests. Reformat it for personal use at home.CompTIA SY0-201: Practice Exam B. Proxy server C." . Decreased administrative overhead C. HIDS B. Authentication D.www. Reduce data center footprint B. C. Diminishing number of end users Answer: A "Pass Any Exam.

Known threats Answer: D QUESTION NO: 380 Which of the following security applications can be implemented to mitigate port scanning attacks from the Internet? A." . Patch management C. Unknown threats D. ARP poisoning B. Integrity Answer: C QUESTION NO: 378 Which of the following threats is mitigated by ensuring operating system patches are current? A. DistributedDoS C. Group policies B. Any Time. Non-repudiation B.com 112 Ac tua QUESTION NO: 379 lTe Answer: B sts A. Security templates D. Patch management software B. Availability D.www.actualtests. Configuration baselines .co m Which operating system hardening procedure can be implemented to ensure all systems have the most up-to-date version available? .CompTIA SY0-201: Practice Exam QUESTION NO: 377 Virtualization technology can be implemented to positively affect which of the following security concepts? A. Confidentiality C. Pop-up blockers "Pass Any Exam.

Any Time. Which of the following is the GREATEST threat that the administrative assistant should be educated about? A. Role-based access control C. Antivirus software D.www. Least privilege D.CompTIA SY0-201: Practice Exam C. Data information verification and up-to-date reporting structure D. Change management Answer: C QUESTION NO: 383 The company's administrative assistant acts as the main point of contact for outside sales vendors and provides information over the phone. Business continuity planning C. Logical tokens Answer: C QUESTION NO: 382 Which of the following describes an action taken after a security breach? A. Personal software firewalls Answer: D QUESTION NO: 381 Limiting access to a file resource to only the creator by default. is an example of applying which of the following security concepts? A.actualtests.com Ac tua lTe sts . Forensic evaluation D.co m 113 . Providing the corporate mailing address to unidentified callers Answer: B "Pass Any Exam. Behavior-based security B. Disaster recovery planning B. Non-redundant personnel role distribution B." . Providing employee personal contact information C.

One of the web developers had posted valid credentials to a web forum while troubleshooting an issue with a vendor.com Ac tua lTe sts .F "Pass Any Exam. Answer: C QUESTION NO: 385 The network administrator has been tasked with creating a VPN connection to a vendors site. compare the systems performance against the configuration baseline." .co m 114 . The administrator should: A. Source OS C. Which of the following would be the network administrators BEST option for configuring this link? A. One time pad Answer: A QUESTION NO: 386 The security administrator is investigating a breach of the company's web server. install any hotfixes that may have been overlooked. The vendor is using older equipment that does not support AES. C. 3DES B. ensure that the antivirus applications definitions are up-to-date.actualtests. analyze the NIDS logs for any errant connections that may have been recorded. A. Successful login Answer: E. Any Time. Number of hops from source E. an administrator wishes to verify the servers functionality post-cleanup. Unsuccessful login B. Source IP F.CompTIA SY0-201: Practice Exam QUESTION NO: 384 After a recent viral intrusion. PGP D. D. Destination IP D. Logging which of the following would have created the BEST way to determine when the breach FIRST occurred? (Select TWO).www. DES C. B.

Which of the following BEST describes this configuration? A. Anomaly-based C. Access . DNS logs D.CompTIA SY0-201: Practice Exam QUESTION NO: 387 Which of the following would MOST likely determine which user inadvertently shut down the Company's web server? A.actualtests. Application logs C. Any Time. Performance logs Answer: A QUESTION NO: 388 The company's NIDS system is configured to pull updates from the vendor and match traffic patterns based on these updates.co m Which of the following logs would MOST likely indicate that there is an ongoing brute force attack against a servers local administrator account? . System C." . OVAL-based D. Firewall B. Which of the following applications did the intruder MOST likely install? A.com 115 Ac tua QUESTION NO: 389 lTe Answer: D sts A.www. Behavior-based B. Access logs B. Account dictionary "Pass Any Exam. Signature-based Answer: D QUESTION NO: 390 An intruder has gained access to a server and installed an application to obtain credentials. Performance D.

Vulnerability scanner C. Which of the following BEST describes this access control method? sts QUESTION NO: 392 . Port scanner C. Which of the following BEST describes the access control method used to limit access to the accounting server? A. Vulnerability scanner B. Any Time. but is denied.com 116 Ac A. The accounts payable representative has returned and now the sales representative is unable to access the files on the accounting server. Job rotation B. Separation of duties B. Networkmapper D." .co m . Which of the following would be BEST suited to accomplishing this task? A. Protocol analyzer D.CompTIA SY0-201: Practice Exam B. Least privilege D.actualtests. Protocol analyzer Answer: A Answer: C QUESTION NO: 393 One of the company's sales representatives had been working as the accounts payable representative while that associate was out on leave. Password cracker Answer: D QUESTION NO: 391 The security administrator wants to know if a new device has any known issues with its available applications. Job rotation "Pass Any Exam.www. Separation of privilege C. Implicit deny tua lTe A new administrative assistant starts with the company and tries to access the personnel file for the Vice President of Operations.

All server room users are required to have unique usernames and passwords. Inform upper management or law enforcement." . Removing all the keyboards from the server room and requiring all administrators to bring keyboards from their desks. Least privilege D.com Ac A. D. B. New server room construction requires a single entrance that is heavily protected. Installing electronic locks on the door to the server room that only allow access to a person swiping anadministrators smartcard. Any Time. D.co m 117 . Go through the email server and accumulate as much evidence as possible. Implicit deny Answer: A QUESTION NO: 394 Which of the following is the BEST example of a technical security policy? A. Posting a sign on the door to the server room indicating that access is restricted to authorized personnel only. Building a new server room that only has a single entrance that is heavily protected. Confront the co-worker and demand all illegal actions cease. C. Answer: B QUESTION NO: 395 Answer: D QUESTION NO: 396 An administrator discovers evidence that a co-worker has been violating the law with the contents of some of their emails. All new employees are required to be mentored by a senior employee for their first few months on the job. B. C.CompTIA SY0-201: Practice Exam C.actualtests.www. tua lTe Which of the following is the BEST example of a physical security policy? sts . C. B. D. Which of the following should the administrator do FIRST? A. "Pass Any Exam. All doors to the server room must have signage indicating that it is a server room. Take what was found to another peer and have the peer confront the co-worker.

C. with some systems. C. Call over a manager and document the attack.CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 397 An on-going attack on a web server has just been discovered. Which of the following would BEST meet their needs? . A spare set of servers stored in the data center B. Monitor the attack until the attacker can be identified. Use a protocol analyzer. Disconnect the server from the network. Use a vulnerability scanner. D." . A cold backup site D. Which of the following should the administrator choose as their FIRST response? A. B.www. The manager wants to know if there are any issues that need to be addressed. Read the log files on each system on the network. Which of the following should be used to test the network? A.actualtests. D.com Ac tua A.co m 118 . Any Time. A warm backup site lTe sts In the event of a disaster resulting in the loss of their data center. but the manager is concerned about affecting normal operations. B. A hot backup site C. Answer: B QUESTION NO: 398 Answer: D QUESTION NO: 399 The manager has tasked an administrator to test the security of the network. a company had determined that they will need to be able to be back online within the next day. This server is non-critical but holds data that could be very damaging to the company if it is disclosed. Answer: C "Pass Any Exam. Launch a counter attack on the other party. Launch aDDoD attack in the network and see what occurs.

Place all the people into departmental groups. B. Assign printer access by access group. Answer: C QUESTION NO: 401 WPA2-Enterprise can use which of the following to authenticate a user? A. Assign printer access by matching individuals to printer groups. Ticket granting server C. Extensible authentication protocol D. Remote access server Answer: B QUESTION NO: 403 Which of the following would protect an employees network traffic on a non-company owned network? "Pass Any Exam. RADIUS C.com Ac tua lTe sts . Assign access to all printers for each group. Each department has its own set of printers. RRAS Answer: B QUESTION NO: 402 Which of the following is a required component for deploying Kerberos? A.www. Assign printer access by matching group to department. D. TKIP D.co m 119 . RSA B.CompTIA SY0-201: Practice Exam QUESTION NO: 400 The administrator needs to set permissions for the new print server for a company comprised of 320 people in 18 departments. Which of the following options is the BEST way to do this? A." . Certificate authority B.actualtests. Place all the people into departmental groups. Place all the people into distribution groups. Any Time. C. Place all the people into departmental groups.

Avoidance D. 802. Acceptance C. Port scanner Answer: B "Pass Any Exam. Antivirus B.com Ac tua A. Rootkit B.www. VPN D. Any Time. Cross-site scripting D. Rainbow table D. RADIUS Answer: C QUESTION NO: 404 Which of the following does an attacker with minimal rights need to accomplish to continue attacking a compromised system? A. Vulnerability scanner B. Transference lTe Which of the following happens to a risk when a company buys insurance to mitigate that risk? sts . Elimination B. Logic bomb C.1x C.actualtests." .co m 120 . Privilege escalation Answer: D QUESTION NO: 405 Answer: D QUESTION NO: 406 Which of the following would an auditor use to determine if an application is sending credentials in clear text? A. Protocol analyzer C.CompTIA SY0-201: Practice Exam A.

Provide a passive check of the networks security D. Actively assess deployed security controls Answer: D QUESTION NO: 409 Which of the following security measures can be used with 802.co m 121 .CompTIA SY0-201: Practice Exam QUESTION NO: 407 An auditor would use credentials harvested from a SQL injection attack during which of the following? A.actualtests.www. Network address translation C. Vulnerability assessment C. Passively assess web vulnerabilities B. Network access control B. Penetration test D. To check compliance of the router configuration C. IPSec VPNs D." . Forensic recovery B.com Ac tua lTe sts . Password strength audit Answer: C QUESTION NO: 408 Which of the following is a goal of penetration testing? A. Internet content filter Answer: A QUESTION NO: 410 Which of the following security protocols could be configured to use EAP when connecting to a wireless access point? "Pass Any Exam.1x? A. Any Time.

Probe B.co m 122 .CompTIA SY0-201: Practice Exam A. Data Answer: C "Pass Any Exam. IPSec D.C QUESTION NO: 413 Disabling the SSID broadcast removes the identifier from which of the following wireless packets? A." . Straight-through cable C. UTP cable tua lTe Which of the following increases availability during periods of electromagnetic interference? (Select TWO). War driving D. ACK C. Physically tap the network B. WPA2-enterprise Answer: D QUESTION NO: 411 Wireless access points with SSID broadcast make it easier to do which of the following? A. Beacon D. Crossover cable E. WPA-personal/TKIP B. Any Time.www. STP cable D.actualtests. Fiber optic cable B. sts QUESTION NO: 412 .com Ac A. Implement encryption Answer: C Answer: A. RADIUS C. Decrease wireless coverage C.

" . Any Time. DistributedDoS B.CompTIA SY0-201: Practice Exam QUESTION NO: 414 A computer is displaying an MBR error upon restart. PAT C. NAC Answer: A QUESTION NO: 417 A company wants a security technician to make sure that users cannot use common words for their passwords. Boot sector virus C.co Which of the following should be disabled to help prevent boot sector viruses from launching when a computer boots? m . Which of the following can the technician implement? (Select TWO). ActiveX D. "Pass Any Exam. The technician is told the user has just installed new software. Hard Drive sts . NAT B. USB D. Trojan Answer: B QUESTION NO: 415 Answer: C QUESTION NO: 416 Which of the following will help hide the IP address of a computer from servers outside the network? A. ACL D. DMZ C.actualtests. Which of the following threats is the MOST likely cause of this error? A.www. SNMP B.com 123 Ac tua lTe A.

actualtests. Group policies E. Discretionary access control list B. Logical tokens B. CHAP Answer: C QUESTION NO: 419 Which of the following sits inline with network traffic and helps prevent malicious behavior as it occurs by either dropping packets or correcting TCP stream related issues? A." .com 124 Ac tua lTe sts . Internet content filter "Pass Any Exam. Mandatory access control list C. Complex passwords D. Two factor authentication Answer: C. HIDS Answer: C QUESTION NO: 420 A library provides an administrator with criteria and keywords to prevent children from accessing certain websites. HIPS B. authorization and accounting to connecting users? A. WPA C. Any Time. Single sign-on C. Which of the following would BEST accomplish this goal? A. RADIUS D. Proxy server D.CompTIA SY0-201: Practice Exam A. LANMAN B. NIDS C.co m .www.D QUESTION NO: 418 Which of the following is a service that provides authentication. NIPS D.

Requiring client and server PKI certificates for all connections D. Bluesnarfing QUESTION NO: 422 QUESTION NO: 423 The last company administrator failed to renew the registration for the corporate web site (e. Which of the following is the BEST mitigation against this type of attack? . Spam D. TCP/IP hijacking C.com Ac Answer: C tua A.co m Answer: B 125 . Phishing B." . Requiring strong authentication for all DNS queries lTe sts A network security administrator is worried about potential man-in-the-middle attacks against users when they access a corporate website from their workstations.www. When the new administrator tried to register the website it is discovered that the registration is being held by a series of small companies for very short periods of time.actualtests.g. Mandating only client-side PKI certificates for all connections C.comptia.org). The network administrator suspects which of the following attacks is being carried out? A. Man-in-the-middle C. Spoofing B. The URL for the website is also slightly different than normal once the users are connected. DNS poisoning "Pass Any Exam. Domain name kiting D.CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 421 Multiple users are having trouble connecting to a secure corporate website and experience a minor delay when logging onto the website. Implementing server-side PKI certificates for all connections B. https://www. Any Time. This is typical of which of the following? A.

NIDS. Distributed power sources. redundant datacenters with IPS C.www. Transition of operations in a short time period in a disaster D. and NAT Answer: B QUESTION NO: 425 Answer: D QUESTION NO: 426 A. Warm site B. Cold site C." .com Ac Which of the following is a component of a disaster recovery plan for a company that expects a site to be rendered non-usable during a disaster and needs a nearly transparent transfer of operations? tua lTe sts A. and VLANs B. Hot site D. Redundant ISPs.co The primary purpose of a hot site is to ensure which of the following? m 126 .actualtests. Distributed. Recovery of operations within 30 days after a disaster C. Alternate site Answer: C QUESTION NO: 427 Which of the following is consistent with the least privilege best practice? "Pass Any Exam. and VPNs D. Seamless operations in the event of a disaster .CompTIA SY0-201: Practice Exam Answer: C QUESTION NO: 424 Which of the following is the BEST mitigation against DoS attacks? A. NAC. Two-factor server authentication. power sources. Adequate HVAC to meet environmental initiatives B. Any Time.

Seamless switching between telephony and IP telephony C. Virtualization B." . USB drives D.www.CompTIA SY0-201: Practice Exam A. Transfer of network infrastructure components to meet demand lTe Which of the following is made possible by some commercial virtualization hosting applications? sts .com Ac tua A. Deploying privilegedusers accounts to all department managers C.co m 127 . Imaging D. P2P software B. Automatic redundancy for power in the event of a blackout B.actualtests. Automatic transfer of applications when hardware fails D. Cloning Answer: A QUESTION NO: 429 Answer: C QUESTION NO: 430 Which of the following is MOST likely to be used to transfer malicious code to a corporate network by introducing viruses during manufacturing? A. Spoofing C. Any Time. Enforcing physical access controls so no one can enter the data center Answer: C QUESTION NO: 428 Cloud computing uses which of the following technologies to automatically provision guests on demand? A. Restricting user permissions so only one person can print B. Cell phones Answer: C "Pass Any Exam. Restricting administrator permissions to the smallest amount of staff possible D. BIOS chips C.

actualtests. Cloning Answer: B QUESTION NO: 434 A technician reports that the email server is being compromised. Which of the following tools can be used to determine how the files are being uploaded? "Pass Any Exam. Any Time. Intrusion detection B. Asymmetric C. Virtualization C. Certificate authority D. Kiting D. Files are being uploaded to change the email portal webpage. Symmetric B. SSL Answer: B QUESTION NO: 432 Which of the following practices is MOST relevant to protecting against operating system security flaws? A." . Firewall configuration D.CompTIA SY0-201: Practice Exam QUESTION NO: 431 PGP is a cryptosystem based on which of the following encryption method? A. Patch management C. Antivirus selection Answer: B QUESTION NO: 433 A.co m .com 128 Ac Which of the following technologies can be used as a means to isolate a host OS from some types of security threats? tua lTe sts .www. Network intrusion detection B.

NAT D. DMZ Answer: C QUESTION NO: 435 Which of the following can be used to prevent ongoing network based attacks? A." . Performance monitor C.CompTIA SY0-201: Practice Exam A.co m 129 .www.actualtests. VPN B. Any Time. Protocol analyzer D. NIPS Answer: D "Pass Any Exam. HIDS C. NIDS B.com Ac tua lTe sts .

Sign up to vote on this title
UsefulNot useful