P. 1
24119724 CompTIA Security SY0 201

24119724 CompTIA Security SY0 201

|Views: 30|Likes:
Published by Pamela Osterhout

More info:

Published by: Pamela Osterhout on Jan 06, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/11/2011

pdf

text

original

Sections

  • QUESTION NO: 1
  • QUESTION NO: 2
  • QUESTION NO: 3
  • QUESTION NO: 4
  • QUESTION NO: 5
  • QUESTION NO: 6
  • QUESTION NO: 7
  • QUESTION NO: 8
  • QUESTION NO: 9
  • QUESTION NO: 10
  • QUESTION NO: 11
  • QUESTION NO: 12
  • QUESTION NO: 13
  • QUESTION NO: 14
  • QUESTION NO: 15
  • QUESTION NO: 16
  • QUESTION NO: 17
  • QUESTION NO: 18
  • QUESTION NO: 19
  • QUESTION NO: 20
  • QUESTION NO: 21
  • QUESTION NO: 22
  • QUESTION NO: 23
  • QUESTION NO: 24
  • QUESTION NO: 25
  • QUESTION NO: 26
  • QUESTION NO: 27
  • QUESTION NO: 28
  • QUESTION NO: 29
  • QUESTION NO: 30
  • QUESTION NO: 31
  • QUESTION NO: 32
  • QUESTION NO: 33
  • QUESTION NO: 34
  • QUESTION NO: 35
  • QUESTION NO: 36
  • QUESTION NO: 37
  • QUESTION NO: 38
  • QUESTION NO: 39
  • QUESTION NO: 40
  • QUESTION NO: 41
  • QUESTION NO: 42
  • QUESTION NO: 43
  • QUESTION NO: 44
  • QUESTION NO: 45
  • QUESTION NO: 46
  • QUESTION NO: 47
  • QUESTION NO: 48
  • QUESTION NO: 49
  • QUESTION NO: 50
  • QUESTION NO: 51
  • QUESTION NO: 52
  • QUESTION NO: 53
  • QUESTION NO: 54
  • QUESTION NO: 55
  • QUESTION NO: 56
  • QUESTION NO: 57
  • QUESTION NO: 58
  • QUESTION NO: 59
  • QUESTION NO: 60
  • QUESTION NO: 61
  • QUESTION NO: 62
  • QUESTION NO: 63
  • QUESTION NO: 64
  • QUESTION NO: 65
  • QUESTION NO: 66
  • QUESTION NO: 67
  • QUESTION NO: 68
  • QUESTION NO: 69
  • QUESTION NO: 70
  • QUESTION NO: 71
  • QUESTION NO: 72
  • QUESTION NO: 73
  • QUESTION NO: 74
  • QUESTION NO: 75
  • QUESTION NO: 76
  • QUESTION NO: 77
  • QUESTION NO: 78
  • QUESTION NO: 79
  • QUESTION NO: 80
  • QUESTION NO: 81
  • QUESTION NO: 82
  • QUESTION NO: 83
  • QUESTION NO: 84
  • QUESTION NO: 85
  • QUESTION NO: 86
  • QUESTION NO: 87
  • QUESTION NO: 88
  • QUESTION NO: 89
  • QUESTION NO: 90
  • QUESTION NO: 91
  • QUESTION NO: 92
  • QUESTION NO: 93
  • QUESTION NO: 94
  • QUESTION NO: 95
  • QUESTION NO: 96
  • QUESTION NO: 97
  • QUESTION NO: 98
  • QUESTION NO: 99
  • QUESTION NO: 100
  • QUESTION NO: 101
  • QUESTION NO: 102
  • QUESTION NO: 103
  • QUESTION NO: 104
  • QUESTION NO: 105
  • QUESTION NO: 106
  • QUESTION NO: 107
  • QUESTION NO: 108
  • QUESTION NO: 109
  • QUESTION NO: 110
  • QUESTION NO: 111
  • QUESTION NO: 112
  • QUESTION NO: 113
  • QUESTION NO: 114
  • QUESTION NO: 115
  • QUESTION NO: 116
  • QUESTION NO: 117
  • QUESTION NO: 118
  • QUESTION NO: 119
  • QUESTION NO: 120
  • QUESTION NO: 121
  • QUESTION NO: 122
  • QUESTION NO: 123
  • QUESTION NO: 124
  • QUESTION NO: 125
  • QUESTION NO: 126
  • QUESTION NO: 127
  • QUESTION NO: 128
  • QUESTION NO: 129
  • QUESTION NO: 130
  • QUESTION NO: 131
  • QUESTION NO: 132
  • QUESTION NO: 133
  • QUESTION NO: 134
  • QUESTION NO: 135
  • QUESTION NO: 136
  • QUESTION NO: 137
  • QUESTION NO: 138
  • QUESTION NO: 139
  • QUESTION NO: 140
  • QUESTION NO: 141
  • QUESTION NO: 142
  • QUESTION NO: 143
  • QUESTION NO: 144
  • QUESTION NO: 145
  • QUESTION NO: 146
  • QUESTION NO: 147
  • QUESTION NO: 148
  • QUESTION NO: 149
  • QUESTION NO: 150
  • QUESTION NO: 151
  • QUESTION NO: 152
  • QUESTION NO: 153
  • QUESTION NO: 154
  • QUESTION NO: 155
  • QUESTION NO: 156
  • QUESTION NO: 157
  • QUESTION NO: 158
  • QUESTION NO: 159
  • QUESTION NO: 160
  • QUESTION NO: 161
  • QUESTION NO: 162
  • QUESTION NO: 163
  • QUESTION NO: 164
  • QUESTION NO: 165
  • QUESTION NO: 166
  • QUESTION NO: 167
  • QUESTION NO: 168
  • QUESTION NO: 169
  • QUESTION NO: 170
  • QUESTION NO: 171
  • QUESTION NO: 172
  • QUESTION NO: 173
  • QUESTION NO: 174
  • QUESTION NO: 175
  • QUESTION NO: 176
  • QUESTION NO: 177
  • QUESTION NO: 178
  • QUESTION NO: 179
  • QUESTION NO: 180
  • QUESTION NO: 181
  • QUESTION NO: 182
  • QUESTION NO: 183
  • QUESTION NO: 184
  • QUESTION NO: 185
  • QUESTION NO: 186
  • QUESTION NO: 187
  • QUESTION NO: 188
  • QUESTION NO: 189
  • QUESTION NO: 190
  • QUESTION NO: 191
  • QUESTION NO: 192
  • QUESTION NO: 193
  • QUESTION NO: 194
  • QUESTION NO: 195
  • QUESTION NO: 196
  • QUESTION NO: 197
  • QUESTION NO: 198
  • QUESTION NO: 199
  • QUESTION NO: 200
  • QUESTION NO: 201
  • QUESTION NO: 202
  • QUESTION NO: 203
  • QUESTION NO: 204
  • QUESTION NO: 205
  • QUESTION NO: 206
  • QUESTION NO: 207
  • QUESTION NO: 208
  • QUESTION NO: 209
  • QUESTION NO: 210
  • QUESTION NO: 211
  • QUESTION NO: 212
  • QUESTION NO: 213
  • QUESTION NO: 214
  • QUESTION NO: 215
  • QUESTION NO: 216
  • QUESTION NO: 217
  • QUESTION NO: 218
  • QUESTION NO: 219
  • QUESTION NO: 220
  • QUESTION NO: 221
  • QUESTION NO: 222
  • QUESTION NO: 223
  • QUESTION NO: 224
  • QUESTION NO: 225
  • QUESTION NO: 226
  • QUESTION NO: 227
  • QUESTION NO: 228
  • QUESTION NO: 229
  • QUESTION NO: 230
  • QUESTION NO: 231
  • QUESTION NO: 232
  • QUESTION NO: 233
  • QUESTION NO: 234
  • QUESTION NO: 235
  • QUESTION NO: 236
  • QUESTION NO: 237
  • QUESTION NO: 238
  • QUESTION NO: 239
  • QUESTION NO: 240
  • QUESTION NO: 241
  • QUESTION NO: 242
  • QUESTION NO: 243
  • QUESTION NO: 244
  • QUESTION NO: 245
  • QUESTION NO: 246
  • QUESTION NO: 247
  • QUESTION NO: 248
  • QUESTION NO: 249
  • QUESTION NO: 250
  • QUESTION NO: 251
  • QUESTION NO: 252
  • QUESTION NO: 253
  • QUESTION NO: 254
  • QUESTION NO: 255
  • QUESTION NO: 256
  • QUESTION NO: 257
  • QUESTION NO: 258
  • QUESTION NO: 259
  • QUESTION NO: 260
  • QUESTION NO: 261
  • QUESTION NO: 262
  • QUESTION NO: 263
  • QUESTION NO: 264
  • QUESTION NO: 265
  • QUESTION NO: 266
  • QUESTION NO: 267
  • QUESTION NO: 268
  • QUESTION NO: 269
  • QUESTION NO: 270
  • QUESTION NO: 271
  • QUESTION NO: 272
  • QUESTION NO: 273
  • QUESTION NO: 274
  • QUESTION NO: 275
  • QUESTION NO: 276
  • QUESTION NO: 277
  • QUESTION NO: 278
  • QUESTION NO: 279
  • QUESTION NO: 280
  • QUESTION NO: 281
  • QUESTION NO: 282
  • QUESTION NO: 283
  • QUESTION NO: 284
  • QUESTION NO: 285
  • QUESTION NO: 286
  • QUESTION NO: 287
  • QUESTION NO: 288
  • QUESTION NO: 289
  • QUESTION NO: 290
  • QUESTION NO: 291
  • QUESTION NO: 292
  • QUESTION NO: 293
  • QUESTION NO: 294
  • QUESTION NO: 295
  • QUESTION NO: 296
  • QUESTION NO: 297
  • QUESTION NO: 298
  • QUESTION NO: 299
  • QUESTION NO: 300
  • QUESTION NO: 301
  • QUESTION NO: 302
  • QUESTION NO: 303
  • QUESTION NO: 304
  • QUESTION NO: 305
  • QUESTION NO: 306
  • QUESTION NO: 307
  • QUESTION NO: 308
  • QUESTION NO: 309
  • QUESTION NO: 310
  • QUESTION NO: 311
  • QUESTION NO: 312
  • QUESTION NO: 313
  • QUESTION NO: 314
  • QUESTION NO: 315
  • QUESTION NO: 316
  • QUESTION NO: 317
  • QUESTION NO: 318
  • QUESTION NO: 319
  • QUESTION NO: 320
  • QUESTION NO: 321
  • QUESTION NO: 322
  • QUESTION NO: 323
  • QUESTION NO: 324
  • QUESTION NO: 325
  • QUESTION NO: 326
  • QUESTION NO: 327
  • QUESTION NO: 328
  • QUESTION NO: 329
  • QUESTION NO: 330
  • QUESTION NO: 331
  • QUESTION NO: 332
  • QUESTION NO: 333
  • QUESTION NO: 334
  • QUESTION NO: 335
  • QUESTION NO: 336
  • QUESTION NO: 337
  • QUESTION NO: 338
  • QUESTION NO: 339
  • QUESTION NO: 340
  • QUESTION NO: 341
  • QUESTION NO: 342
  • QUESTION NO: 343
  • QUESTION NO: 344
  • QUESTION NO: 345
  • QUESTION NO: 346
  • QUESTION NO: 347
  • QUESTION NO: 348
  • QUESTION NO: 349
  • QUESTION NO: 350
  • QUESTION NO: 351
  • QUESTION NO: 352
  • QUESTION NO: 353
  • QUESTION NO: 354
  • QUESTION NO: 355
  • QUESTION NO: 356
  • QUESTION NO: 357
  • QUESTION NO: 358
  • QUESTION NO: 359
  • QUESTION NO: 360
  • QUESTION NO: 361
  • QUESTION NO: 362
  • QUESTION NO: 363
  • QUESTION NO: 364
  • QUESTION NO: 365
  • QUESTION NO: 366
  • QUESTION NO: 367
  • QUESTION NO: 368
  • QUESTION NO: 369
  • QUESTION NO: 370
  • QUESTION NO: 371
  • QUESTION NO: 372
  • QUESTION NO: 373
  • QUESTION NO: 374
  • QUESTION NO: 375
  • QUESTION NO: 376
  • QUESTION NO: 377
  • QUESTION NO: 378
  • QUESTION NO: 379
  • QUESTION NO: 380
  • QUESTION NO: 381
  • QUESTION NO: 382
  • QUESTION NO: 383
  • QUESTION NO: 384
  • QUESTION NO: 385
  • QUESTION NO: 386
  • QUESTION NO: 387
  • QUESTION NO: 388
  • QUESTION NO: 389
  • QUESTION NO: 390
  • QUESTION NO: 391
  • QUESTION NO: 392
  • QUESTION NO: 393
  • QUESTION NO: 394
  • QUESTION NO: 395
  • QUESTION NO: 396
  • QUESTION NO: 397
  • QUESTION NO: 398
  • QUESTION NO: 399
  • QUESTION NO: 400

CompTIA SY0-201

SY0-201 CompTIA Security +( 2008 Edition) Exam

Practice Test
Updated: Oct 1, 2009 Version 1.5

CompTIA SY0-201: Practice Exam QUESTION NO: 1 Who is responsible for establishing access permissions to network resources in the DAC access control model? A. The system administrator. B. The owner of the resource. C. The system administrator and the owner of the resource. D. The user requiring access to the resource. Answer: B

QUESTION NO: 2

Which access control system allows the system administrator to establish access permissions to network resources? A. MAC B. DAC C. RBAC D. None of the above. Answer: A

QUESTION NO: 4 You work as a network administrator for your company. Taking personal safety into consideration, what fire suppression substances types can effectively prevent damage to electronic equipment? A. Halon "Pass Any Exam. Any Time." - www.actualtests.com 2

Ac

tua

QUESTION NO: 3

lTe

Answer: D

sts

A. To offer an environment where new network applications can be tested B. To offer a secure virtual environment to conduct online deployments C. To offer a virtual collaboration environment to discuss security research D. To offer an environment where malware can be executed with minimal risk to equipment and software

.co

m

Why do security researchers often use virtual machines?

CompTIA SY0-201: Practice Exam B. CO C. Water D. Foam Answer: B

QUESTION NO: 5 Which of the following access control models uses roles to determine access permissions? A. MAC B. DAC C. RBAC D. None of the above. Answer: C

QUESTION NO: 6

Given: John is a network administrator. He advises the server administrator of his company to implement whitelisting, blacklisting, closing-open relays and strong authentication techniques. Question: Which threat is being addressed? A. Viruses B. Adware C. Spam D. Spyware Answer: C

QUESTION NO: 7 Most current encryption schemes are based on A. digital rights management B. time stamps C. randomizing D. algorithms Answer: D

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

m

3

manage. Kiting Answer: D QUESTION NO: 9 Answer: D QUESTION NO: 10 A. Asymmetric D. The public key infrastructure is based on which encryption schemes? tua lTe sts A. Symmetric D. store. people. software.co Which of the following types of cryptography is typically used to provide an integrity check? m 4 . and revoke digital certificates. Public key B. Quantum C. distribute. Elliptical curve Answer: C QUESTION NO: 11 How is access control permissions established in the RBAC access control model? "Pass Any Exam.CompTIA SY0-201: Practice Exam QUESTION NO: 8 Study the following items carefully. Hash .com Ac The Public Key Infrastructure (PKI) is a set of hardware. Domain hijacking D. Any Time. and procedures needed to create.actualtests. policies. Symmetric B. Asymmetric C." . DNS poisoning C. Spoofing B.www. which one will permit a user to float a domain registration for a maximum of five days? A.

com Ac A. Increased loss business data B. The owner of the resource. None of the above. Predefined access privileges. "Pass Any Exam. Any Time. The role or responsibilities users have in the organization C. B. The system administrator. C.actualtests. Access Control Lists D. Introduction of material on to the network C. Answer: C QUESTION NO: 12 Which threat is increased by the availability of portable external storage such as USB hard drives to networks? A." . Introduction of rogue wireless access points Answer: C QUESTION NO: 13 Answer: C QUESTION NO: 14 What does the DAC access control model use to identify the users who have permissions to a resource? A. tua lTe What does the DAC access control model use to identify the users who have permissions to a resource? sts .CompTIA SY0-201: Practice Exam A. The role or responsibilities users have in the organization.co m 5 . None of the above. B. Removal of sensitive and PII data D.www. B. Predefined access privileges. None of the above. Access Control Lists D. The role or responsibilities users have in the organization C. D.

Asymmetric D. Pseudorandom Number Generator (PRNG) Answer: B QUESTION NO: 18 "Pass Any Exam.CompTIA SY0-201: Practice Exam Answer: C QUESTION NO: 15 What does the DAC access control model use to identify the users who have permissions to a resource? A. Which of the following describes a type of algorithm that cannot be reversed in order to decode the data? A. The role or responsibilities users have in the organization C. Predefined access privileges. Predefined access privileges. The role or responsibilities users have in the organization C. One Way Function C. Any Time.com Ac QUESTION NO: 17 tua Answer: C lTe sts . Access Control Lists D. Symmetric B. None of the above. B.www. Answer: D QUESTION NO: 16 What does the DAC access control model use to identify the users who have permissions to a resource? A. B.actualtests." . None of the above.co m 6 . Access Control Lists D.

actualtests. Private keys Answer: A QUESTION NO: 19 Secret Key encryption is also known as: A. Access Control Lists D. Public keys C.co m 7 . such as virtualized browsers. Both public and private keys B. Malware installation from suspects Internet sites B. B. Any Time. replay C. Man-in-the-middle attacks D.www. Phishing and spam attacks Answer: A QUESTION NO: 21 What does the MAC access control model use to identify the users who have permissions to a resource? A. symmetrical B. Which types of keys are included in a CRL? A. Steganographic keys D. DDoS attacks against the underlying OS C.com Ac tua lTe sts . None of the above "Pass Any Exam. D. one way function. can protect the underlying operating system from which of the following? A. Predefined access privileges. The role or responsibilities users have in the organization C." .CompTIA SY0-201: Practice Exam CRL is short for Certificate Revocation List. asymmetrical Answer: A QUESTION NO: 20 Virtualized applications.

VLAN C." . which one is a collection of servers setup to attract hackers? A. C.com Ac tua lTe A.co Which of the following statements regarding the MAC access control models is TRUE? m 8 . Botnet B. Any Time. In the Mandatory Access Control (MAC) users cannot share resources dynamically. The Mandatory Access Control (MAC) model is not restrictive. Honeypot B. D.actualtests. In the Mandatory Access Control (MAC) the owner of a resource establishes access privileges to that resource. sts .CompTIA SY0-201: Practice Exam Answer: A QUESTION NO: 22 For the following items. Virus Answer: D QUESTION NO: 25 Which of the following are types of certificate-based authentication? (Select TWO) "Pass Any Exam. The Mandatory Access Control (MAC) model is a dynamic model. B. Worm D.www. Adware C. Honeynet D. DMZ Answer: C QUESTION NO: 23 Answer: C QUESTION NO: 24 Which description is correct about an application or string of code that could not automatically spread from one system to another but is designed to spread from file to file? A.

Mobile device C. an access control list (ACL) is a list of permissions attached to an object.actualtests. Performance B. NAT D. Many-to-one mapping B. VPN C.B QUESTION NO: 26 In computer security. One-to-many mapping D. Which log will reveal activities about ACL? A. Role Based Access Control (RBAC) D.CompTIA SY0-201: Practice Exam A. VLAN B. which is an area of the network infrastructure that allows a technician to put public facing systems into it without compromising the entire infrastructure? A. Any Time.com Ac tua A. DMZ Answer: D "Pass Any Exam. centralized management lTe The ability to logon to multiple systems with the same credentials is typically known as: sts . One-to-one mapping C. single sign-on C.co m 9 . Firewall D.www." . Transaction Answer: C QUESTION NO: 27 Answer: B QUESTION NO: 28 For the following options. decentralized management B. Many-to-many mapping Answer: A.

Any Time. Disaster recovery plan B. B. the need to know B.com Ac tua A." . Which of the following is an example of remote authentication? m 10 . acceptable usage C. Fault tolerant systems Answer: A QUESTION NO: 30 Answer: D QUESTION NO: 31 Documentation describing a group expected minimum behavior is known as:Documentation describing a group? expected minimum behavior is known as: A.CompTIA SY0-201: Practice Exam QUESTION NO: 29 Which of the following would be MOST important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction? A. Alternate sites C. A user in one building logs on to the network by entering a username and password into a host in the same building. lTe sts .co Remote authentication allows you to authenticate Zendesk users using a locally hosted script. A user on a metropolitan area network (MAN) accesses a host by entering a username and password pair while not connected to the LAN. the separation of duties D.actualtests.www. a code of ethics Answer: D "Pass Any Exam. D. A user on a campus area network (CAN) connects to a server in another building and enters a username and password pair. C. A user in one city logs onto a network by connecting to a domain server in another city. Offsite storage D.

com 11 Ac tua lTe sts .www. Which type of attack is similar to this product? A. D. B.co m . Any Time. A duplication D. A mirror B.actualtests. Answer: A QUESTION NO: 34 The CEO of your company is worrying about staff browsing inappropriate material on the Internet via HTTPS. Replay C. The DAC (Discretionary Access Control) model does not use the identity of a user to control access to resources. scan the content and then repackage the SSL session without staff knowing. The DAC (Discretionary Access Control) model uses only the identity of the user or specific process to control access to a resource.CompTIA SY0-201: Practice Exam QUESTION NO: 32 What maybe happen when hashing two different files creates the same result? A. Man-in-the-middle Answer: D QUESTION NO: 35 "Pass Any Exam. TCP/IP hijacking B. The DAC (Discretionary Access Control) model uses certificates to control access to resources. Your company is advised to purchase a product which can decrypt the SSL session. C. This creates a security loophole for Trojan horse attacks. A pseudo-random event Answer: B QUESTION NO: 33 The DAC (Discretionary Access Control) model has an inherent flaw. This allows anyone to use an account to access resources. The DAC (Discretionary Access Control) model does not have any known security flaws. Spoofing D. Choose the option that describes this flaw. A collision C." . This creates an opportunity for attackers to use your certificates. A.

C.com. A. Each user has its own workstation. and accesses resources based on the department wherein he/she works. LBACs (List Based Access Control) method D. Sales. RBACs (Role Based Access Control) method C. You must plan the security strategy for users to access resources on the Certkiller. DACs (Discretionary Access Control) method Answer: A "Pass Any Exam. and Production respectively. Acceptable use policies B. Any Time. The Certkiller. Create Finance. Disaster planning Answer: B QUESTION NO: 37 Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item. and Production roles.com network uses the RBAC (Role Based Access Control) model. Research and Development." .www. D. and files and printers. Certkiller. Sales. Which of the following roles should you create? A.actualtests. Change management C. and file and printer roles. B. MACs (Mandatory Access Control) method B.com Ac tua lTe sts QUESTION NO: 36 .com is divided into distinct departments and functions named Finance.co m 12 .com network. Create allow access and deny access roles. Create mailbox. The types of resources you must control access to are mailboxes. You must determine which roles to create to support the RBAC (Role Based Access Control) model. Answer: B Sending a patch through a testing and approval process is an example of which option? A.CompTIA SY0-201: Practice Exam You work as the network administrator at Certkiller. Research and Development. Create user and workstation roles. User education and awareness training D.

Answer: D QUESTION NO: 39 A company's new employees are asked to sign a document that describes the methods of and purposes for accessing the company's IT systems. B." .com 13 Ac tua QUESTION NO: 40 lTe sts . Acceptable Use Policy Answer: D What technology is able to isolate a host OS from some types of security threats? A.www. Which of the following BEST describes this document? A.actualtests. Due diligence form D. Any Time. Kiting B. An email from the vendor B.co m .CompTIA SY0-201: Practice Exam QUESTION NO: 38 For the following items. C. It increases false positives on the NIDS. Intrusion detection Answer: B QUESTION NO: 41 Which of the following is the BEST place to obtain a hotfix or patch for an application or system? A. Virtualization C. If an attack occurs. Authorized Access Policy C. Cloning D. D. Privacy Act of 1974 B. Patch management becomes more time consuming. which is a security limitation of virtualization technology? A. A compromise of one instance will immediately compromise all instances. The manufacturer's website "Pass Any Exam. it could potentially disrupt multiple servers. A newsgroup or forum C.

com Ac tua lTe sts .actualtests. HIDS logs C. John the Ripper D." . A.www. Which one of the following items is a password cracking tool? A.CompTIA SY0-201: Practice Exam D. Proxy logs D. BIBA D. Any Time. Wireshark B. Bell La-Padula C. Clark and Wilson Answer: A QUESTION NO: 44 Password cracking tools are available worldwide over the Internet. A CD-ROM Answer: C QUESTION NO: 42 Tom is a network administrator of his company. Firewall logs Answer: D QUESTION NO: 43 Choose the terminology or concept which best describes a (Mandatory Access Control) model. AirSnort Answer: C "Pass Any Exam. Nessus C.co m 14 . Which item will most effectively confirm the administrators?? suspicions? A. Lattice B. He guesses that PCs on the internal network may be acting as zombies participating in external DDoS attacks. AV server logs B.

The KDC authenticates the network. If the response fails. The authentication system creates a token every time a user or a session begins. If your token does not grant you access to certain information. Any Time. The server sends a challenge back to the client. that information will either not be displayed or your access will be denied. BUT limited access is allowed. server. authorize or fail referred to? A. The challenge is encrypted and then sent back to the server. the server grants authorization. the session fails and the request phase starts over "Pass Any Exam. encrypts value response. or systems. Certificates B. Which option is the MOST basic form of IDS? 15 . If you have a pass. This occurs automatically when a request or service is performed by another network." . Kerberos Answer: C QUESTION NO: 46 Answer: A QUESTION NO: 47 Which of the following statements is TRUE regarding the Security Token system? A. compare encrypts results.actualtests. you can wander throughout the network. Behavioral . D. Statistical C. the token is destroyed. The authentication process uses a Key Distribution Center (KDC) to orchestrate the entire process. The initiator sends a logon request from the client to the server. programs. Anomaly D.co m IDS is short for Intrusion Detection Systems. Security Tokens C. Once this ticket is issued. A certificate being handed from the server to the client once authentication has been established. B. At the completion of a session.com Ac tua lTe sts A. The server compares the value from the client and if the information matches.CompTIA SY0-201: Practice Exam QUESTION NO: 45 Which authentication method does the following sequence: Logon request. challenge. it can be used to authenticate against other principles. C. CHAP D. Principles can be users. The KDC provides a ticket to the network.www. Signature B.

Preview screens should be disabled D.C.D QUESTION NO: 51 Which of the following types of publicly accessible servers should have anonymous logins disabled to prevent an attacker from transferring malicious data? "Pass Any Exam. Content D. RSA Answer: B QUESTION NO: 49 To aid in preventing the execution of malicious code in email clients. URLs Answer: A.com 16 Ac QUESTION NO: 50 tua Answer: A lTe sts . IKE D.actualtests. Any Time. CRLs C.co m . Certificates B.www. Spam and anti-virus filters should be used B. Regular updates should be performed C. which of the following should be done by the email administrator? A.CompTIA SY0-201: Practice Exam Answer: A QUESTION NO: 48 Which statement is true about the cryptographic algorithm employed by TLS to establish a session key? A. Email client features should be disabled Internet filter appliances/servers will most likely analyze which three items? (Select THREE). Blowfish B. Diffie-Hellman C." . A.

MAC B. pki D. Cross-site scripting D. Phreaking B. which of the following are the MOST common techniques that attackers use to socially engineer people? (Select TWO) sts QUESTION NO: 53 . Object oriented coding G. Assuming a position of authority tua lTe In addition to bribery and forgery." . DNS Answer: A QUESTION NO: 52 Which practice can best code applications in a secure manner? A.E QUESTION NO: 54 Which of the following will restrict access to files according to the identity of the user or group? A. Flattery E. Any Time.www.actualtests. CRL C. Email C. Web D. Whois search D. Input validation B.CompTIA SY0-201: Practice Exam A.com Ac A. DAC Answer: D "Pass Any Exam.co m 17 . FTP B. Rapid Application Development (RAD) Answer: A Answer: D. Dumpster diving C.

firewall B. Host based intrusion detection D.actualtests. which item is LEAST effective? "Pass Any Exam." . Answer: A QUESTION NO: 56 Answer: A QUESTION NO: 57 A software or hardware device that allows only authorized network traffic in or out of a computer or network is called a: A. Network based intrusion detection sts . anti-virus program Answer: A QUESTION NO: 58 While hardening an operating system. packet sniffer C. File integrity auditing B. Right click on the lock at the bottom of the browser and check the certificate information B.CompTIA SY0-201: Practice Exam QUESTION NO: 55 Which of the following would be an easy way to determine whether a secure web page has a valid certificate? A. Stateful packet filtering C. configuration files. Contact the web page's web master D.com Ac tua lTe A. Ensure that the web URL starts with 'https:\\'. Any Time.www. ContactThawte or Verisign and ask about the web page C. and log files? m 18 .co Which description is correct concerning the process of comparing cryptographic hash functions of system executables. honeypot D.

lays dormant until a user opens the certain program then deletes the contents of attached network drives and removable storage devices is known as a: A. A static NAT uses a many to many mapping.co m . network address translation (NAT) is the process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another. Limiting administrative privileges C. Install a software firewall Answer: C QUESTION NO: 59 Which of the following types of attacks is BEST described as an attacker capturing part of a communication and later sending that communication segment to the server while pretending to be the client? A. Answer: D QUESTION NO: 61 Malicious code that enters a target system. TCP/IP hijacking B.CompTIA SY0-201: Practice Exam A. Configuration baselines B. A static NAT uses a one to many mapping. D. Installing HIDS D. Replay C. A static NAT uses a one to one mapping. worm "Pass Any Exam." . C.www.com 19 Ac tua In computer networking. Man in the middle Answer: B QUESTION NO: 60 A. Any Time. Which description is true about a static NAT? lTe sts . Back door D.actualtests. B. A static NAT uses a many to one mapping.

Unplug the Ethernet cable from the wireless access point. As an Internet standard (RFC 1321). TACACS+ C. Kerberos d. Answer: A Answer: C QUESTION NO: 64 In cryptography." .CompTIA SY0-201: Practice Exam B. Change the SSID on the wireless access point C.www.actualtests. Enable MAC filtering on the wireless access point. Which description is true about a hash? A. stores a shared key for each network resource and uses a Key Distribution Center (KDC)? sts QUESTION NO: 63 . MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value. Any Time.co m . B. B. logic bomb D. RADIUS B. Run a ping against the wireless access point.com 20 Ac tua A. honeypot Answer: C QUESTION NO: 62 Which action should be performed when discovering an unauthorized wireless access point attached to a network? A. "Pass Any Exam. Trojan horse C. and is also commonly used to check the integrity of files. pki lTe Which of the following network authentication protocols uses symmetric key cryptography. A hash is a unique number that is generated after the file has been encrypted and used as the SSL key during download. D. A user sees an MD5 hash number beside a file that they wish to download. MD5 has been employed in a wide variety of security applications. A hash is a unique number that is generated based upon the TCP/IP transmission header and should be verified before download.

Role Based Access Control (RBAC) C.CompTIA SY0-201: Practice Exam C. Mandatory Access Control (MAC) B. security awareness training B. Use of default passwords tua lTe When a new network device is configured for first-time installation. which of the following is a security threat? sts ." . A hash is a unique number that is generated based upon the files contents and should be verified after download. Installation of a back door D. Denial of Service (DoS) B.co m 21 . A hash is a unique number that is generated based upon the files contents and used as the SSL key during download.actualtests. Answer: D QUESTION NO: 65 The risks of social engineering can be decreased by implementing: (Select TWO) A. risk assessment policies C operating system patching instructions D. Attacker privilege escalation C. Any Time. Discretionary Access Control (DAC) Answer: A "Pass Any Exam. identity verification methods Answer: A QUESTION NO: 66 Answer: D QUESTION NO: 67 Which of the following access control models uses subject and object labels? A.www. vulnerability testing techniques E.com Ac A. Rule Based Access Control (RBAC) D. D.

Which of the following is considered the weakest encryption? A. Ownership C. DES C. called a ciphertext.www. RSA D. Enterprise performance monitoring software C.CompTIA SY0-201: Practice Exam QUESTION NO: 68 Encryption is the conversion of data into a form. that cannot be easily understood by unauthorized people. Enterprise resource planning software Answer: B QUESTION NO: 71 Audit log information can BEST be protected by: (Select TWO). Enterprise key management software D. Access control lists B. Sensitivity labels sts .com Ac tua lTe A.actualtests. Group membership D." .co Which of the following access decisions are based on a Mandatory Access Control (MAC) environment? m 22 . "Pass Any Exam. Enterprise antivirus software B. 5HA B. Any Time. AES Answer: B QUESTION NO: 69 Answer: D QUESTION NO: 70 Which tool can best monitor changes to the approved system baseline? A.

F. provide root level access D. B. D. Any Time.CompTIA SY0-201: Practice Exam A. Install only needed software.co m . Download the patch file through a SSL connection.actualtests. are not visible to an IDS C. Download the patch file over an AES encrypted VPN connection. an intrusion prevention system (IPS) E. an IDS C. a firewall that creates an enclave Answer: C. decrease the surface area for the attack E. C.F QUESTION NO: 74 Which action should be performed to harden workstations and servers? A. Report all security incidents." . access controls that restrict usage D. Compare the final LANMAN hash with the original.com 23 Ac tua Non-essential services are often appealing to attackers because non-essential services: (Select TWO) lTe sts Answer: A .E QUESTION NO: 72 Which method will most effectively verify that a patch file downloaded from a third party has not been modified since the time that the original manufacturer released the patch? A. QUESTION NO: 73 A.www. using a VPN B. B. recording to write-once media. "Pass Any Exam. consume less bandwidth B. Compare the final MD5 hash with the original. are not typically configured correctly or secured F. sustain attacks that go unnoticed Answer: E.

com Ac tua lTe sts . A port scanner Answer: B QUESTION NO: 77 Which of the following types of malicious software travels across computer networks without requiring a user to distribute the software? A. Logic bomb Answer: B "Pass Any Exam.actualtests. Which of the following would be the BEST description of this program? A. A protocol analyzer C. Check the logs regularly. and ICMP packets on the network. Trojan horse D. Virus B. P0P3. Logic bomb Answer: C QUESTION NO: 76 John works as a network administrator for his company. Any Time. A penetration test D. Worm B.www. This is an example of which of the following? A. He uses a tool to check SMTP. A vulnerability scan B.CompTIA SY0-201: Practice Exam C. DNS. D. Worm C.co m 24 . Log on only as the administrator. Virus C." . Trojan horse D. Answer: B QUESTION NO: 75 A user downloads and installs a new screen saver and the program starts to rename and delete random files.

Answer: C QUESTION NO: 79 Answer: D QUESTION NO: 80 In order to recover discarded company documents.www. Insider theft Answer: C QUESTION NO: 81 Which of the following types of authentication BEST describes providing a username. Implement an authentication system and WEP. Mutual "Pass Any Exam.com 25 Ac tua lTe sts A. D. C. B. Implement an identification system and WPA2." .co m Which of the following should be done if an audit recording fails in an information system? . Dumpster diving D.CompTIA SY0-201: Practice Exam QUESTION NO: 78 What will be implemented by a technician to mitigate the chances of a successful attack against the wireless network? A.actualtests. Phishing C. which of the following might an attacker resort to? A. Any Time. Shoulder surfing B. Stop generating audit records D. Log off the user B. Implement a biometric system and WEP. Overwrite the oldest audit records C. Multifactor B. Implement an authentication system and WPA. password and undergoing a thumb print scan to access a workstation? A. Send an alert to the appropriate personnel .

" . Biometrics B. sso Answer: D QUESTION NO: 85 "Pass Any Exam. Auditing every system event D.CompTIA SY0-201: Practice Exam C.co m Answer: D 26 .com Ac tua lTe A. Any Time. Imaging software D. Biometric D. Smart card C. Vulnerability assessment C. Deciding what events to audit sts Which of the following steps is MOST often overlooked during the auditing process? . Reviewing event logs regularly B. Kerberos Answer: A QUESTION NO: 82 Which item specifies a set of consistent requirements for a workstation or server? A. Two-factor authentication D.actualtests. Configuration baseline QUESTION NO: 83 Answer: A QUESTION NO: 84 Users would not like to enter credentials to each server or application to conduct their normal work. Patch management B. Enabling auditing on the system C.www. Which type of strategy can solve this problem? A.

23 B. 88 C 139 D.com Ac A. A. SQL servers "Pass Any Exam. The information that is needed to reconstruct events B. Looking over a co-workersshould'er to retrieve information C." .www.D Answer: A QUESTION NO: 88 In computer programming. The password requirements for user accounts C. Any Time. double entry doors and security guards are all prevention measures for which of the following types of social engineering? lTe QUESTION NO: 87 sts . The virtual memory allocated on the log server D. DLL injection is a technique used to run code within the address space of another process by forcing it to load a dynamic-link library. Impersonation tua Turnstiles.actualtests. Looking through a co-worker's trash to retrieve information D. Which activity is MOST closely associated with DLL injection? A.co m 27 . The amount of disk space required Answer: A. Piggybacking B. 443 Answer: B QUESTION NO: 86 What should be taken into consideration while executing proper logging procedures? (Select TWO). Penetration testing B.CompTIA SY0-201: Practice Exam Kerberos uses which of the following ports by default? A.

installs Trojan horse viruses QUESTION NO: 90 Answer: B QUESTION NO: 91 Which of the following programming techniques should be used to prevent buffer overflow attacks? A. D. Network mapping D.www. Backup all data at a preset interval to removable disk and store the disk in a fireproof safe in the buildings basement." . Backup all data at a preset interval to removable disk and store the disk in a safety deposit box at the administrators home. Backup all data at a preset interval to tape and store those tapes at a sister site across the street. Which additional action should Alex perform to block disaster in the case the primary site is permanently lost? . wastes company bandwidth D. Input validation B. tua lTe sts Alex is a network administrator of his company. Nested loops C. B. He is backing up all server data nightly to a local NAS device. Automatic updates "Pass Any Exam. Backup all data at a preset interval to tape and store those tapes at a sister site in another city. verifies the validity of an email address B.actualtests.CompTIA SY0-201: Practice Exam C. Any Time. Signed applets D.co m Answer: C .com 28 Ac A. corrupts the mail file C. C. Vulnerability assessment Answer: A QUESTION NO: 89 Spam is considered a problem even when deleted before being opened because spam: A.

Configuration baseline B. Kerberos . For messages sent through an insecure channel. CHAP D. Any Time. Receivers private key C. Security Tokens C. Group policy C. the message digest is encrypted with which of the following keys? A." .www.actualtests. Senders private key Answer: D QUESTION NO: 95 "Pass Any Exam. a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Certificates B.co Which of the following authentication systems make use of the KDC Key Distribution Center? m 29 . Senders public key B. Patch management D. Receivers public key D. While using a digital signature. Security template Answer: A QUESTION NO: 93 Answer: D QUESTION NO: 94 A digital signature or digital signature scheme is a type of asymmetric cryptography.CompTIA SY0-201: Practice Exam Answer: A QUESTION NO: 92 Which description is correct about the standard load for all systems? A.com Ac tua lTe sts A.

" . Which technology should be installed at the data center to prevent piggybacking? "Pass Any Exam. The CIO has mandated to stop this behavior. Three factor authentication B. Any Time. B. C. Kerberos G. PAP is insecure because usernames and passwords are sent over the network in clear text. SSO C.co m .www.com 30 Ac tua QUESTION NO: 97 lTe sts . Smart Cards. MS-CHAP version 1 is capable of mutual authentication of both the client and the server. B. CHAP D. RADIUS is a client/server-based system that provides authentication. and accounting services for remote dial-up access.CompTIA SY0-201: Practice Exam Which of the following authentication methods increases the security of the authentication process because it must be in your physical possession? A. Certificate Answer: A QUESTION NO: 96 Users need to access their email and several secure applications from any workstation on the network. Answer: D QUESTION NO: 98 Many unauthorized staff has been entering the data center by piggybacking authorized staff. password. In addition. This is an example of which of the following? A. D. ACL D. and a company issued smart card. CHAP is more secure than PAP because it encrypts usernames and passwords before they are sent over the network. Least privilege Answer: B Which of the following statements regarding authentication protocols is FALSE? A. an authentication system implemented by the administrator requires the use of a username. authorization.actualtests.

multiple access methods management systems D. B." . C. in conjunction with the proper PIN (Personal Identification Number).com 31 Ac tua lTe sts QUESTION NO: 100 . To minimize weak encryption Answer: C QUESTION NO: 101 Which definition best defines what a challenge-response session is? A.CompTIA SY0-201: Practice Exam A.actualtests. Token access C. A challenge-response session is a special hardware device used to produce random text in a cryptography system. To allow wireless usage C. Any Time. synchronized passwords management systems Answer: A Why will a Faraday cage be used? A. To mitigate data emanation D. Security badges D. To find rogue access points B. A challenge-response session is a workstation or system that produces a random login ID that the user provides. Hardware locks Answer: A QUESTION NO: 99 Which password management system best provides for a system with a large number of users? A. "Pass Any Exam.www. when prompted. Self service password reset management systems B.co m . Locally saved passwords management systems C. when prompted. Mantrap B. A challenge-response session is a workstation or system that produces a random challenge string that the user provides. in conjunction with the proper PIN (Personal Identification Number).

Clocks are used to both benchmark and specify the optimal encryption algorithm. A challenge-response session is the authentication mechanism in the workstation or system that does not determine whether the owner should be authenticated.com Ac tua lTe sts . Security log Answer: B "Pass Any Exam. VLAN Answer: A QUESTION NO: 103 For which reason are clocks used in Kerberos authentication? A. Clocks are used to ensure proper connections. Answer: A QUESTION NO: 102 The hashing algorithm is created from a hash value. Performance baseline C. C. B. Which of the following can most effectively determine whether network utilization is abnormal? A. Any Time. Clocks are used to ensure that tickets expire correctly.co m 32 .actualtests. NTLMv2 B.www. Systems monitor D. Clocks are used to generate the seed value for the encryptions keys. LANMAN C. NTLM D. making it nearly impossible to derive the original input number. D.CompTIA SY0-201: Practice Exam D." . Application log B. Which item can implement the strongest hashing algorithm? A. Answer: B QUESTION NO: 104 Network utilization is the ratio of current network traffic to the maximum traffic that the port can handle.

CompTIA SY0-201: Practice Exam QUESTION NO: 105 To reduce vulnerabilities on a web server. and/or disabling of computer systems. Spam D. RAID B. Any Time. Brute force Answer: B QUESTION NO: 108 An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing. Any downtime to this website will lead to serious financial damage for this organization. Proxy server D. then "Pass Any Exam.actualtests. Answer: B QUESTION NO: 106 A travel reservation organization conducts the majority of its transactions via a public facing website. Enable auditing on the web server and periodically review the audit logs D. One web server is connected to several distributed database servers. C. an administrator should adopt which of the following preventative measures? A. Apply the most recent manufacturer updates and patches to the server." . Block all Domain Name Service (DNS) requests coming into the server. Single point of failure Answer: D QUESTION NO: 107 Which of the following is a common type of attack on web servers? A. Use packet sniffing software on all inbound communications B. Warm site C. Buffer overflow C.com 33 Ac tua lTe sts . When an IDS is configured to match a specific traffic pattern. Birthday B.www. Which statement is correct about this scenario? A.co m . manipulating. mainly through a network. such as the Internet.

Not enough space available D. Integrity of data C. Any Time. Availability of data B. communications are open and unprotected C.co m 34 . Signature-based B. communications are a drain on bandwidth B.actualtests.CompTIA SY0-201: Practice Exam which of the following is this referring to? A. has no common protocol D.www.com Ac tua Removable storage has been around almost as long as the computer itself. a network interface card "Pass Any Exam. uses weak encryption Answer: B QUESTION NO: 110 A. The MOST important security issue to address when using instant messaging is that instant messaging: A. a modem C. Confidentiality of data Answer: D QUESTION NO: 111 A VPN typically provides a remote access link from one host to another over: A. Anomaly-based D. Behavior-based C. Heuristic-based Answer: A QUESTION NO: 109 The employees at a company are using instant messaging on company networked computers." . an intranet B. Which of the following is the GREATEST security risk regarding removable storage? lTe sts .

the Internet Answer: D QUESTION NO: 112 In which authentication model a ticket granting server is an important concept? A. Asymmetric cryptography D. Any Time. and then finally covered again with a thin insulating layer on the outside. RADIUS Answer: C Answer: D QUESTION NO: 114 Coaxial cable is a cable consisting of an inner conductor. pap C. Diffusion of the core light source Answer: B "Pass Any Exam. surrounded by a tubular insulating layer typically made from a flexible material with a high dielectric constant. Crosstalk between the wire pairs B.www. Non-repudiation sts Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received? . all of which is then surrounded by another conductive layer (typically of fine woven wire for flexibility. CHAP B.actualtests." .com Ac tua lTe A. Data emanation from the core C. Kerberos D. or of a thin metallic foil). Anti-aliasing B. Refraction of the signal D.CompTIA SY0-201: Practice Exam D.co QUESTION NO: 113 m 35 . Which is the primary security risk with coaxial cable? A. Data integrity C.

Look for hidden files. Any Time. Filter router D." . Extranet B. Demilitarized zone (DMZ) C. Demilitarized zone (DMZ) Answer: A QUESTION NO: 118 In a secure environment. Analyze temporary files. Which step should be taken FIRST? m 36 .com Ac tua lTe A. Intranet C. IDS B. B. sts . D. Bastion host Answer: B QUESTION NO: 116 Answer: C QUESTION NO: 117 Which of the following is MOST often used to allow a client or partner access to a network? A.co A technician is conducting a forensics analysis on a computer system. which authentication mechanism will perform better? "Pass Any Exam. Get a binary copy of the system. VLAN D.www. C.actualtests.CompTIA SY0-201: Practice Exam QUESTION NO: 115 Which of the following portions of a company's network is between the Internet and an internal network? A. Search for Trojans.

To ensure that all servers start from a common security configuration Answer: C. Stateful inspection Answer: A Which goals can be achieved by use of security templates? (Select TWO). TACACS because it encrypts client-server negotiation dialogs. RADIUS because it encrypts client-server passwords. Packet filters D. Application-proxy B. Any Time. D. RADIUS because it is a remote access authentication service.co m 37 . Which of the following would be the FIRST step to take? A. Enforce the security policy. B.actualtests. C.D QUESTION NO: 121 A newly hired security specialist is asked to evaluate a company's network security. To ensure that PKI will work properly within thecompanys trust model B." . Answer: B QUESTION NO: 119 Which of the following types of firewalls provides inspection at layer 7 of the OSI model? A. B. C. TACACS because it is a remote access authentication service. Password management "Pass Any Exam.CompTIA SY0-201: Practice Exam A.www. The security specialist discovers that users have installed personal software.com Ac tua lTe sts QUESTION NO: 120 . A. the network OS has default settings and no patches have been installed and passwords are not required to be changed regularly. To ensure that servers are in compliance with the corporate security policy D. To ensure that performance is standardized across all servers C. Network address translation (NAT) C. Install software patches. Disable non-essential services. D.

CompTIA SY0-201: Practice Exam Answer: C

QUESTION NO: 122 Which of the following can be used to implement a procedure to control inbound and outbound traffic on a network segment? A. Proxy B. NIDS C. ACL D. HIDS Answer: C

QUESTION NO: 123

Giving each user or group of users only the access they need to do their job is an example of which of the following security principals? A. Least privilege B. Defense in depth C. Separation of duties D. Access control Answer: A

Which one of the following is not Bluetooth threat? A. blue jacking. B. bluesnarfing. C. discovery mode. D. asmurf attack. Answer: D

QUESTION NO: 125 A company implements an SMTP server on their firewall. This implementation would violate which of the following security principles? "Pass Any Exam. Any Time." - www.actualtests.com 38

Ac

QUESTION NO: 124

tua

lTe

sts

.co

m

CompTIA SY0-201: Practice Exam A. Keep the solution simple B. Use a device as intended C. Create an in-depth defense D. Address internal threats Answer: B

QUESTION NO: 126 In computing, the Basic Input/Output System (BIOS , also known as the System BIOS, is a de facto standard defining a firmware interface for IBM PC Compatible computers. A user is concerned with the security of their laptops BIOS. The user would not like anyone to be able to access control functions except themselves. Which of the following could make the BIOS more secure? A. Password B. Flash the BIOS C. Encrypt the hard drive D. Create an access-list Answer: A

QUESTION NO: 127

A. Router B. Hub C. Switch D. Firewall Answer: C

QUESTION NO: 128 In computing, a Uniform Resource Locator (URL) is a type of Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it. When a user attempts to go to a website, he notices the URL has changed, which attack will MOST likely cause the problem? "Pass Any Exam. Any Time." - www.actualtests.com 39

Ac

tua

A company is upgrading the network and needs to reduce the ability of users on the same floor and network segment to see each other's traffic. Which of the following network devices should be used?

lTe

sts

.co

m

CompTIA SY0-201: Practice Exam A. ARP poisoning B. DLL injection C. DNS poisoning D. DDoS attack Answer: C

QUESTION NO: 129 A system administrator reports that an unauthorized user has accessed the network. Which of the following would be the FIRST action to take? A. Notify management. B. Determine the business impact. C. Contact law enforcement officials. D. Contain the problem. Answer: D

QUESTION NO: 130

Answer: C

QUESTION NO: 131 A companys security' specialist is securing a web server that is reachable from the Internet. The web server is located in the core internal corporate network. The network cannot be redesigned and the server cannot be moved. Which of the following should the security specialist implement to secure the web server? (Select TWO). A. Router with an IDS module B. Network-based IDS C. Router with firewall rule set "Pass Any Exam. Any Time." - www.actualtests.com 40

Ac

A. Update the antivirus definition file. B. Apply a security patch from the vendor. C. Repeat the vulnerability scan. D. Perform a penetration test.

tua

lTe

After analyzing vulnerability and applying a security patch, which non-intrusive action should be taken to verify that the vulnerability was truly removed?

sts

.co

m

port scans or even attempts to crack into computers by monitoring network traffic. C. At the stage when the connection is established.actualtests. Which method can be used to perform denial of service (DoS) attacks? A.F QUESTION NO: 132 A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. sts . and the server sends a challenge back to the client At which stage does the CHAP protocol perform the handshake process? Choose the best complete answer.www. At the stage when the connection is established and when the connection is disconnected. Which NIDS configuration is solely based on specific network traffic? A. Adware B. Any Time. Spyware D.CompTIA SY0-201: Practice Exam D. Botnet C. At the stage when the connection is established and at whichever time after the connection has been established." . Host-based firewall Answer: D. D. Network-basedfirewal F. Host-based IDS E. tua lTe The CHAP (Challenge Handshake Authentication Protocol) sends a logon request from the client to the server. Privilege escalation Answer: B QUESTION NO: 133 Answer: A QUESTION NO: 134 A network intrusion detection system (NIDS) is an intrusion detection system that tries to detect malicious activity such as denial of service attacks. Anomaly-based "Pass Any Exam.com 41 Ac A. At the stage when the connection is disconnected.co m . B.

Behavior-based D.m. Domain Name Service (DNS) D. Signature-based Answer: D QUESTION NO: 135 Which of the following are nonessential protocols and services? A. The company policy for availability needs full backups on Sunday and incremental backups each week night at 10 p. Host-based C. The file server crashes on Wednesday afternoon. Three D. Internet Control Message Protocol (ICMP) "Pass Any Exam.CompTIA SY0-201: Practice Exam B. Network News Transfer Protocol (NNTP) B. C. C. Any Time.com Ac A. Four tua lTe You work as a network technician for your company.www. SNMP (Simple Network Management Protocol).actualtests. Internet Control Message Protocol (ICMP) Answer: B QUESTION NO: 136 Answer: C QUESTION NO: 137 Which of the following protocols are not recommended due to them supplying passwords and information over the network? A. Two C. how many types are required to restore the data on the file server for Thursday morning? sts . One B.co m 42 . Network News Transfer Protocol (NNTP) B." . Domain Name Service (DNS) D. TFTP (Trivial File Transfer Protocol).

UPS line conditioner. UPS line conditioner B.CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 138 Which is the correct order in which crucial equipment should draw power? A. DNS poisoning Answer: A QUESTION NO: 141 Which of the following describes a server or application that is accepting more input than the server or application is expecting? "Pass Any Exam.co Most key fob based identification systems use which of the following types of authentication mechanisms? (Select TWO). and backup generator Answer: D QUESTION NO: 139 Which item will MOST likely permit an attacker to make a switch function like a hub? A. Backup generator. Any Time.actualtests. Kerberos B. Certificates E. UPS battery. UPS battery D. m . Username/password D.com 43 Ac QUESTION NO: 140 tua Answer: C. UPS line conditioner.www.E lTe A. MAC flooding B. Backup generator. Token sts . UPS battery." . backup generator C. ARP poisoning D. Uninterruptible Power Supply (UPS) battery. Biometrics C. DNS spoofing C. UPS line conditioner.

CompTIA SY0-201: Practice Exam A. The authentication information is a keyed hash based on all of the bytes in the packet. Chain of custody "Pass Any Exam. Evidence log B. B. Denial of service (DoS) B. Integrity C. Non-repudiation D. Buffer overflow D. The authentication information hash will increase by one if the bytes remain the same on transfer. Confidentiality Answer: B QUESTION NO: 144 Which description is correct about the form used while transferring evidence? A. Authentication B. Which of the following is correct about authentication headers (AH)? A.com 44 Ac tua Which of the following refers to the ability to be reasonably certain that data is not modified or tampered with? lTe sts . Any Time. D. The authentication information hash will remain the same if the bytes change on transfer. Booking slip C.actualtests.co m . C. Brute force Answer: C QUESTION NO: 142 The IP Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams (hereafter referred to as just "authentication"). and to provide protection against replays." . Syntax error C. The authentication information may be the same on different packets if the integrity remains in place.www. Answer: A QUESTION NO: 143 A.

social engineering QUESTION NO: 146 Answer: B QUESTION NO: 147 A security specialist has downloaded a free security software tool from a trusted industry site. C. The source has published the MD5 hash values for the executable program.com 45 Ac tua A. Group policy implementation C. Ignore the MD5 hash values because the values can change during IP fragmentation. Password policy enforcement D.actualtests. a man-in-the-middle attack D. a Trojan horse C. a phishing attack B.CompTIA SY0-201: Practice Exam D. Avoid executing the file and contact the source website administrator B. Use of logical tokens B. Re-run the anti-virus program to ensure that it contains no virus execute D. household appliances and office equipment.co m Answer: D . Which of the following will allow a technician to restrict a user accessing to the GUI? sts . Which of the following steps should the specialist take? A.www." . Any Time. The specialist performs a successful virus scan on the download but the MD5 hash is different. Affidavit Answer: C QUESTION NO: 145 Disguising oneself as a reputable hardware manufacturer's field technician who is picking up a server for repair would be described as: A. "Pass Any Exam. Access control lists lTe A graphical user interface (GUI) is a type of user interface which allows people to interact with electronic devices such as computers. Portable Media Players or Gaming devices. hand-held devices such as MP3 Players. Install the executable program because there was probably a mistake with the MD5 value.

L2TP C. Kerberos D. Protocol analyzer B.www.CompTIA SY0-201: Practice Exam Answer: A QUESTION NO: 148 Which authentication method will prevent a replay attack from occurring? A. Host routing table C HIDS D. Any Time. Transport . Application B. RADIUS B. Bluesnarfing Answer: A QUESTION NO: 151 Which of the following would be the BEST reason to disable unnecessary services on a server? "Pass Any Exam." .actualtests.com Ac Which of the following can be used by a technician to detect staff members that are connecting to an unauthorized website? tua lTe sts A. CHAP Answer: C QUESTION NO: 149 Answer: C QUESTION NO: 150 A.co Which of the following identifies the layer of the OSI model where SSL provides encryption? m 46 . Session D. Network C.

which is an example of an attack that executes once a year on a certain date? A." . C.co m 47 .com Ac A. Protocol analyzer D. Any Time. If a service doesn't support the function of the server the service won't be missed. Worm Answer: C QUESTION NO: 153 Answer: A QUESTION NO: 154 Which tool can help the technician to find all open ports on the network? A. List Based Access Control (LBAC) D. Role Based Access Control (RBAC) C.CompTIA SY0-201: Practice Exam A. Not starting a service will save system memory and reduce startup time. B. Rootkit B. Mandatory Access Control (MAC) B.actualtests. Performance monitor C. Router ACL B. Logic bomb D. Virus C. Discretionary Access Control (DAC) tua lTe Access controls based on security labels associated with each data item and each user are known as: sts . Network scanner Answer: D "Pass Any Exam. Attack surface and opportunity for compromise are reduced D. Services can be re-enabled if needed at a later time Answer: C QUESTION NO: 152 For the following items.www.

Role Based Access Control (RBAC) Answer: A QUESTION NO: 156 Which algorithms can best encrypt large amounts of data? A. Man-in-the-middle B. Rule Based Access Control (RBAC) D. Any Time. Symmetric key algorithms C. Discretionary Access Control (DAC) B." . Password guessing Answer: B QUESTION NO: 158 During which phase of identification and authentication does proofing occur? "Pass Any Exam.actualtests. Social engineering C.www. Asymmetric key algorithms B. Mandatory Access Control (MAC) C. ECC algorithms D.co m 48 .CompTIA SY0-201: Practice Exam QUESTION NO: 155 A user is assigned access rights explicitly.com Ac Which of the following describes an attacker encouraging a person to perform an action in order to be successful? tua lTe sts . Hashing algorithms Answer: B QUESTION NO: 157 A. Back door D. This is a feature of which of the following access control models? A.

Installing antivirus D." . phishing C.CompTIA SY0-201: Practice Exam A. Authentication B.www. Identification Answer: D QUESTION NO: 159 A user has received an email from a mortgage company asking for personal information including bank account numbers. packet sniffing D.co m 49 . a hoax Answer: B QUESTION NO: 160 Answer: D QUESTION NO: 161 Which of the following connectivity is required for a web server that is hosting an SSL based web site? A. Disabling unused services lTe Which item can reduce the attack surface of an operating system? sts . This would BEST be described as: A.actualtests. Installing HIDS B. Any Time. Patch management C. Port 443 outbound C. Port 443 inbound B. Port 80 outbound Answer: A "Pass Any Exam. spam B. Port 80 inbound D. Testing C. Verification D.com Ac tua A.

Answer: A QUESTION NO: 165 Which of the following is used to determine equipment status and modify the configuration or settings of network devices? A. which is a protocol analyzer? A. Apply security templates enterprise wide. WireShark C. Apply group policy management techniques. B. Monitor P2P program usage through content filters. User IDs and passwords Answer: B Which description is correct about a way to prevent buffer overflows? A. D. Any Time. The fingerprint of the operating system C.co m 50 . SNMP "Pass Any Exam.com Ac tua QUESTION NO: 164 lTe sts . Computer name B. Nessus D.CompTIA SY0-201: Practice Exam QUESTION NO: 162 For the following items.www. Cain _Abel B.actualtests. The physical cabling topology of a network D. Apply all security patches to workstations." . John the Ripper Answer: B QUESTION NO: 163 Malicious port scanning is a method of attack to determine which of the following? A. C.

Access control lists D. Any Time.www. MD5 D. Constrained user interfaces Answer: A QUESTION NO: 168 Network traffic is data in a network. DHCP C SMTP D.co m 51 . 3DES B. Single sign-on B.CompTIA SY0-201: Practice Exam B. highly secure encryption of a USB flash drive? A.com Ac tua lTe sts . Protocol analyzer C. Password cracker Answer: B "Pass Any Exam.actualtests. Firewall D. Encryption protocol C. Port scanner B. AES256 Answer: D QUESTION NO: 167 Which of the following describes the process by which a single user name and password can be entered to access multiple computer applications? A. CHAP Answer: A QUESTION NO: 166 Which item will effectively allow for fast. Which tool can be used to review network traffic for clear text passwords? A." . SHA-1 C.

C. Disaster recovery plan C. D. Lack of security awareness C.actualtests. which of the following needs to be documented? A. Install remote control software. Strong passwords are not required B.com 52 Ac tua lTe sts . Identification and authentication C. Audit trail of systems usage B. Apply all service packs. Audit logs are not monitored frequently Answer: B QUESTION NO: 172 Which security action should be finished before access is given to the network? A. Identification and authorization B.CompTIA SY0-201: Practice Exam QUESTION NO: 169 To preserve evidence for later use in court." . Multiple logins are allowed D. Any Time. Chain of custody Answer: D QUESTION NO: 170 What are best practices while installing and securing a new system for a home user? (Select THREE).co m .www. Apply all system patches. A.C. Authentication and authorization D.D QUESTION NO: 171 Which of the following is a major reason that social engineering attacks succeed? A. B. Use a strong firewall. Answer: A. Chain of certificates D. Authentication and password "Pass Any Exam.

Delta Answer: B QUESTION NO: 174 Which port must be open to allow a user to login remotely onto a workstation? A.actualtests. B. 3389 D. Any Time. 636 C. 53 B.www. Incremental B. single sign-on Answer: D QUESTION NO: 176 Which item best describes an instance where a biometric system identifies legitimate users as being unauthorized? "Pass Any Exam." .com 53 Ac tua lTe sts .CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 173 Which of the following types of backups requires that files and software that have been changed since the last full backup be copied to storage media? A. Differential C. need to know C. Discretionary Access Control (DAC). 8080 Answer: C QUESTION NO: 175 The authentication process where the user can access several resources without the need for multiple credentials is known as: A. Full D.co m . decentralized management D.

CompTIA SY0-201: Practice Exam A.com Ac tua A. False acceptance B. False negative Answer: C QUESTION NO: 177 The purpose of the SSID in a wireless network is to: A." . identify the network D. Virtual Private Networking (VPN) lTe Which of the following is the best description about the method of controlling how and when users can connect in from home? sts QUESTION NO: 178 . Open relays Answer: D "Pass Any Exam. False positive C. secure the WAP C. Web proxy B. Any Time. B.co m 54 . Trojan horse programs D. define the encryption protocols used. Remote access policy B. protect the client Answer: C Answer: A QUESTION NO: 179 Which of the following would be the MOST common method for attackers to spoof email? A.actualtests. Remote authentication C. Man in the middle attacks C. False rejection D.www. Terminal access control D.

D. 1.com 55 Ac tua QUESTION NO: 182 lTe sts ." .www. A technician is reviewing the system logs for a firewall and is told that there is an implicit deny within the ACL Which is an example of an implicit deny? A. a list of acceptable testing techniques and tools to be utilized. C. 32 ports B. Any Time. A. Each item is denied by default because of the implicit deny. Answer: A QUESTION NO: 183 Choose the figure which represents the number of ports in the TCP/IP (Transmission Control Protocol/Internet Protocol) which are vulnerable to being scanned. handling of information collected by the penetration testing team. C. D.actualtests. Persistent cookie B.CompTIA SY0-201: Practice Exam QUESTION NO: 180 The implicit deny will block anything you didn't specifically allow but you may have allowed stuff that you don't need. Web bug C. An ACL is a way to secure traffic from one network to another. Answer: C QUESTION NO: 181 Which of the following is often misused by spyware to collect and report a user's activities? A. B.024 ports "Pass Any Exam. Items which are not specifically given access are denied by default. a complete list of all network vulnerabilities. Session cookie Answer: C Which of the following is not identified within the penetration testing scope of work? A. attacked.co m . B. IP addresses of machines from which penetration testing will be executed. Tracking cookie D. and exploited. An implicit deny statement denies all traffic from one network to another.

Many HIDS are not good at detecting attacks on database servers. B. Recovery key G.535 ports D. C.777. A. D. Many HIDS have a negative impact on system performance. Which of the following would be considered a detrimental effect of a virus hoax? (Select TWO). 65.co Answer: B. Answer: B." . Many HIDS only offer a low level of detection granularity.www.C QUESTION NO: 186 Which types of keys will be used if a server and workstation communicate via SSL? (Select TWO). Session key D. Keylogger Answer: A "Pass Any Exam. B. Public key B. Any Time. A. Technical support resources are consumed by increased user calls. The email server capacity is consumed by message traffic. Users are tricked into changing the system configuration.actualtests.CompTIA SY0-201: Practice Exam C. he is making a decision between implementing a HIDS on the database server and implementing a NIDS. Users are at risk for identity theft.C m 56 . Why NIDS may be better to implement? (Select TWO). A.com Ac tua lTe sts QUESTION NO: 185 .216 ports Answer: C QUESTION NO: 184 Tom is a network technician of his company. Many HIDS are not able to detect network attacks. 16. C. Now. D.

" . To analyze the various network traffic with protocol analyzers "Pass Any Exam. The cell phone should require a password after a set period of inactivity. Active prevention D. C. Any Time. Which is a security reason to implement virtualization throughout the network infrastructure? A.actualtests. B. Hardening C. leave the SSID default. To implement additional network services at a lower cost B. Enumerating B.www. D.llx network from being automatically discovered.CompTIA SY0-201: Practice Exam QUESTION NO: 187 To keep an 802.com 57 Ac tua lTe sts . virtualization is a broad term that refers to the abstraction of computer resources. turn off the SSID broadcast B. C. The cell phone should have data connection abilities disabled. activate the SSID password Answer: A QUESTION NO: 188 Which security policy will be most likely used while attempting to mitigate the risks involved with allowing a user to access company email via their cell phone? A. The cell phone should only be used for company related emails. The cell phone data should be encrypted according to NIST standards. change the SSID name. Answer: A QUESTION NO: 189 Which of the following BEST describes the baseline process of securing devices on a network infrastructure? A. a user should: A. D. Passive detection Answer: B QUESTION NO: 190 In computing.co m .

co m 58 . Tape B. Hard disk D. To isolate the various network services and roles D. CD-R C.actualtests. DNS D. Private addressing Answer: B "Pass Any Exam.www. Signature-based NIPS C." .com Ac tua lTe sts . what needs to be updated to the baseline? A. SOCKS B.CompTIA SY0-201: Practice Exam C. Signature-based NIDS D. Behavior-based HIDS Answer: D QUESTION NO: 193 Which of the following could cause communication errors with an IPSec VPN tunnel because of changes made to the IP header? A. USB drive Answer: B QUESTION NO: 192 After installing new software on a machine. NAT C. Honeypot B. Any Time. To centralize the patch management of network servers Answer: C QUESTION NO: 191 Which of the following types of removable media is write-once and appropriate for archiving security logs? A.

Anti-spyware D. all other PCs on the network are accepting the updates successfully. Use a protocol analyzer to find the cause of the traffic. Install HIDS to determine the CPU usage. What should be examined first? A.com Ac tua lTe sts . Extranet C. Any Time. Pop-up blocker Answer: B QUESTION NO: 195 A company wants to connect the network to a manufacturer's network to be able to order parts.www. a portmanteau from the words malicious and software. Scatternet B. Run performance monitor to evaluate the CPU usage. D. A network technician suspects that a piece of malware is consuming too many CPU cycles and slowing down a system.actualtests. Answer: B QUESTION NO: 197 "Pass Any Exam. B. VPN D." . is software designed to infiltrate or damage a computer system without the owner's informed consent. Which of the following types of networks should the company implement to provide the connection while limiting the services allowed over the connection? A. Intranet Answer: B QUESTION NO: 196 Malware. Install malware scanning software.co m 59 . C.CompTIA SY0-201: Practice Exam QUESTION NO: 194 A PC is rejecting push updates from the server. Password expiration B. Local firewall C. Which item can help determine the amount of CPU cycles being consumed? A.

can be run for a longer distance E. Implicit deny D. Which is an example of this? A.com Ac tua lTe sts ." . the company will have access to their private keys? A. 110 E. D. 194 C. is made of glass rather than copper.CompTIA SY0-201: Practice Exam Which of the following ports are typically used by email clients? (Select TWO) A. Store the keys in escrow. 23 Answer: C. is hard to tap in to. is more difficult to install Answer: A. Job rotation Answer: D QUESTION NO: 199 Fiber optic cable is considered safer than CAT5 because fiber optic cable: (Select TWO). 143 D. 49 F. A. a company decides to exchange positions of the purchasing agent and the accounts receivable agent. is not susceptible to interference. "Pass Any Exam.www. Least privilege C.D QUESTION NO: 198 In order to allow for more oversight of past transactions. 3389 B.actualtests.co m 60 .B QUESTION NO: 200 How to make sure that when an employee leaves the company permanently. B. Separation of duties B. Any Time. C.

Interception B. the auditor is running a password cracker against the master password file. Store them in a CRL.216 Answer: B Answer: A QUESTION NO: 203 Which of the following access attacks would involve looking through your files in the hopes of finding something interesting? A." . None of the above "Pass Any Exam.com Ac A.535 D. A.co m 61 . Answer: A QUESTION NO: 201 A DNS (Domain Name Service) server uses a specific port number. Port 16. Fingerprinting tua lTe An outside auditor has been contracted to determine whether weak passwords are being used on the network. Malware scan C.024 C.actualtests. D. C. Port 32 B.777.www. Eavesdropping D. Port 1. Any Time.CompTIA SY0-201: Practice Exam B. Snooping C. Port 65. Immediately delete the account. Which of the following is an example of this? sts QUESTION NO: 202 . Vulnerability assessment B. Obtain the employees hardware token. Baselining D. In order to achieve this goal. Choose this port number from the options.

D. lTe sts A company wants to implement a VLAN. integrity Answer: D QUESTION NO: 205 QUESTION NO: 206 John works as a network administrator for his company. C. C. D.co m . fault tolerance.www. Any Time.actualtests.CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 204 Identify the service provided by message authentication code (MAC) hash. The remote PC has a spam slave application running and the local PCs have a spam master application running. MAC addresses can be spoofed and DTP allows rogue network devices to configure ports B. The remote PC has a zombie master application running and the local PCs have a zombie slave application running. MAC addresses are a secure authentication mechanism and DTP allows only authenticated users. A. he discovers that many internal PCs are sending packets on a routine basis to a single external PC. Senior management believes that a VLAN will be secure because authentication is accomplished by MAC addressing and that dynamic trunking protocol (DTP) will facilitate network efficiency. Which statement correctly describes what is happening? A. key recovery. On the monthly firewall log.com 62 Ac Answer: A tua A. data recovery. "Pass Any Exam. Which of the following issues should be discussed with senior management before VLAN implementation? . MAC addresses can be spoofed and DTP allows only authenticated users. B. C. MAC addresses are a secure authentication mechanism and DTP allows rogue network devices to configure ports. B." . The remote PC has a zombie slave application running and the local PCs have a zombie master application running.

www. Cipher key C. Answer: B QUESTION NO: 207 Pretty Good Privacy (PGP) uses a PKI Trust Model where no certificate authority (CA) is subordinate to another. hierarchical D. Public key B. Revoke the key C. peer-to-peer B.com Ac tua lTe sts . Delete the key D. downlevel C. Shared key D. Any Time. Private key Answer: D QUESTION NO: 209 Which of the following would be an effective way to ensure that a compromised PKI key can not access a system? A.co m 63 . The remote PC has a spam master application running and the local PCs have a spam slave application running. Renew the key Answer: B "Pass Any Exam." . hybrid Answer: A QUESTION NO: 208 Which key can be used by a user to log into their network with a smart card? A. The model with no single trusted root is known as: A. Reconfigure the key B.actualtests.CompTIA SY0-201: Practice Exam D.

Destruction Answer: C QUESTION NO: 211 Answer: D QUESTION NO: 212 Users on a network report that they are receiving unsolicited emails from the same email address. AES ." . Diffie-Hellman C. C. hard drive) for future use? A.www.CompTIA SY0-201: Practice Exam QUESTION NO: 210 Which description is true about the process of securely removing information from media (e. B. Install an anti-spam filter on the domain mail servers and filter the email address.g. Reformatting C.com 64 Ac tua lTe sts A. Any Time. Sanitization D.actualtests. Install an ACL on the firewall to block traffic from the sender and filter the IP address. 3DES B.co m Which of the following provides the MOST secure form of encryption? . Which action should be performed to prevent this from occurring? A. Confidentiality C. Configure rules on the users host and restart the host. Configure a rule in each users router and restart the router. Non-repudiation "Pass Any Exam. DES D. Integrity B. Deleting B. D. Answer: C QUESTION NO: 213 Which of the following describes the validation of a message's origin? A.

Replacing the least significant byte of each bit D. Disable USB within the workstations BIOS.co m 65 .www. Decentralized B. Any Time.com Ac tua lTe sts . Run spyware detection against all workstations. Which mitigation technique would address this concern? (Select TWO). Disable the USB root hub within the OS. Apply the concept of least privilege to USB devices.actualtests. Asymmetric encryption Answer: C QUESTION NO: 214 Users are using thumb drives to connect to USB ports on company workstations. Centralized C. B. Hub and spoke D. C. Replacing the least significant bit of each byte Answer: D "Pass Any Exam.C QUESTION NO: 215 Using software on an individual computer to generate a key pair is an example of which of the following approaches to PKI architecture? A." . Distributed key Answer: A QUESTION NO: 216 Which description is true about how to accomplish steganography in graphic files? A. D. A technician is concerned that sensitive files can be copied to the USB drives. Replacing the most significant bit of each byte B. Answer: A. Replacing the most significant byte of each bit C.CompTIA SY0-201: Practice Exam D. A.

Nessus Answer: D QUESTION NO: 219 Answer: A QUESTION NO: 220 You work as a network administrator for your company. Which will be your first response? A. logic bomb D. Recovery "Pass Any Exam. Hash Answer: B QUESTION NO: 218 Which one of the following options is a vulnerability assessment tool? A. Trojan hors tua Malicious software that travels across computer networks without user assistance is an example of a: lTe sts . AirSnort B. ROT13 D. Any Time.www. Your company has just detected a malware incident. Cain _Abel D.actualtests. Containment C. worm B.CompTIA SY0-201: Practice Exam QUESTION NO: 217 Which of the following types of encryption would be BEST to use for a large amount of data? A. virus C.co m . Asymmetric B. Removal B." .com 66 Ac A. John the Ripper C. Symmetric C.

com 67 Ac tua A. This is an example of: A. The performance logs C. The firewall logs B." . social engineering C. Monitor Answer: B QUESTION NO: 221 When setting password rules. Answer: A QUESTION NO: 223 A person pretends to be a telecommunications repair technician. enters a building stating that there is a networking trouble work order and requests that a security guard unlock the wiring closet The person connects a packet sniffer to the network switch in the wiring closet and hides the sniffer behind the switch against a wall. Complex passwords that users can not remotely change are randomly generated by the administrator and given to users D. B.www. a penetration test "Pass Any Exam.co Answer: C m .CompTIA SY0-201: Practice Exam D. a man in the middle attack D. C. After a set number of failed attempts the server will lock out any user account forcing the user to call the administrator to re-enable the account. The access logs lTe You are a network technician of your company. which of the following would lower the level of security of a network? A. What should be checked FIRST? sts QUESTION NO: 222 . a vulnerability scan B. You have just detected an intrusion on your company??s network from the Internet. Any Time. Passwords must be greater than six characters and contain at least one non-alpha. All passwords are set to expire at regular intervals and users are required to choose new passwords that have not been used before.actualtests. The DNS logs D.

actualtests. Implement session lock mechanism. B. Answer: A QUESTION NO: 227 Which of the following definitions would be correct regarding Active Inception? A. Any Time. Copy or save the logs to a remote log server.CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 224 Which method could identify when unauthorized access has occurred? A. B. Implement previous logon notification.com Ac tua lTe sts A. B. Someone looking through your files. Implement session termination mechanism. C. Answer: B QUESTION NO: 225 Answer: C QUESTION NO: 226 Which practice is the best to secure log files? A. C. . Change security settings to avoid corruption. Log all failed and successful login attempts. Someone looking through your files "Pass Any Exam. C. Deny administrators all access to log files to prevent write failures. Listening or overhearing parts of a conversation D. Placing a computer system between the sender and receiver to capture information. D. D. Involve someone who routinely monitors network traffic.www." . Implement two-factor authentication.co Which of the following definitions would be correct regarding Eavesdropping? m 68 .

C.co m 69 . Listening or overhearing parts of a conversation D. Involve someone who routinely monitors network traffic C.CompTIA SY0-201: Practice Exam B. By reviewing the written procedures B. The process using the ports should be examined. Which of the following would be the FIRST step to take? A. Nmap should be run again and observed to see whether different results are obtained. By using software to recover deleted files Answer: C QUESTION NO: 229 Nmap has been run against a server and more open ports than expected have been discovered. A static NAT uses a one to many mapping. A static NAT uses a many to one mapping. Answer: D "Pass Any Exam. Placing a computer system between the sender and receiver to capture information. B.www. Any Time. All ports should be left open and traffic monitored for malicious activity D.com Ac tua lTe sts ." . Answer: D QUESTION NO: 230 Which statement best describes a static NAT? A. B. A static NAT uses a many to many mapping. Answer: D QUESTION NO: 228 How to test the integrity of a company's backup data? A. By conducting another backup C. C. A static NAT uses a one to one mapping. D.actualtests. By restoring part of the backup D. All ports should be closed and observed to see whether a process tries to reopen the port.

CompTIA SY0-201: Practice Exam QUESTION NO: 231 Which of the following would be MOST desirable when attacking encrypted data? A. Sniffed traffic B. Block cipher C. Weak key D. Algorithm used Answer: C

QUESTION NO: 232 Which scanner can find a rootkit? A. Email scanner B. Malware scanner C. Anti-spam scanner D. Adware scanner Answer: B

QUESTION NO: 233

A. A locked, windowless building B. A military facility with computer equipment containing biometrics. C. A public building that has shared office space. D. A company with a dedicated information technology (IT) security staff. E. A company with a help desk whose personnel have minimal training. Answer: C,E

QUESTION NO: 234 What is steganography primarily used for? A. Data integrity B. Message digest C. Hide information "Pass Any Exam. Any Time." - www.actualtests.com 70

Ac

tua

Social engineering attacks would be MOST effective in which of the following environments? (Select TWO).

lTe

sts

.co

m

CompTIA SY0-201: Practice Exam D. Encrypt information Answer: C

QUESTION NO: 235 Which of the following is the MOST effective way for an administrator to determine what security holes reside on a network? A. Perform a vulnerability assessment B. Run a port scan C. Run a sniffer D. Install and monitor an IDS

QUESTION NO: 236

Answer: B

QUESTION NO: 237

A company has instituted a VPN to allow remote users to connect to the office. As time progresses multiple security associations are created with each association being more secure. Which of the following should be implemented to automate the selection of the BEST security association for each user? A. AES B. 3DES C. SHA D. IKE Answer: D

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. Cold site B. Hot site C. Warm site D. Reciprocal site

lTe

sts

For the following sites, which one has the means (e.g. equipment, software, and communications) to facilitate a full recovery within minutes?

.co

m

Answer: A

71

CompTIA SY0-201: Practice Exam

QUESTION NO: 238 Which item is not a logical access control method? A. biometrics B. group policy. C. ACL D. software token. Answer: A

QUESTION NO: 239 The concept that a web script is run in its own environment and cannot interfere with any other process is known as a: A. honey pot B. VLAN C. quarantine D. sandbox Answer: D

QUESTION NO: 240

Which description is true about the external security testing? A. Conducted from outside the perimeter switch but inside the border router B. Conducted from outside the perimeter switch but inside the firewall C. Conducted from outside the organizations security perimeter D. Conducted from outside the building that hosts the organizations servers Answer: C

QUESTION NO: 241 A small manufacturing company wants to deploy secure wireless on their network. Which of the following wireless security protocols could be used? (Select TWO).

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

m

72

WAN Answer: A. Any Time." . Start the incident respond plan C. Rootkit Answer: D "Pass Any Exam. Forensic analysis B.www. Access Control List (ACL) Answer: A QUESTION NO: 244 Which one of the following options will permit an attacker to hide the presence of malicious code through altering the systems process and registry entries? A.com Ac tua lTe sts QUESTION NO: 243 . WPA D.CompTIA SY0-201: Practice Exam A. Logic bomb C. SSL B. WEP B. Worm D. Trojan B. Damage and loss control Answer: C Which of the following uses private key / public key technology to secure web sites? A.actualtests.co m 73 . TCP C.C QUESTION NO: 242 What should be established immediately upon evidence seizure? A. IPX C. Chain of custody D. Media Access Control (MAC) D.

buffer overflows Answer: D QUESTION NO: 248 Which option is correct about a hash algorithms ability to avoid the same output from two guessed inputs? A. illicit servers B.com 74 Ac tua QUESTION NO: 247 lTe Answer: C sts . Weak encryption can be easily broken Answer: B QUESTION NO: 246 Patch management must be combined with full-featured systems management to be effective.co m . A user must trust the public key that is received C. active content (e. B.actualtests.g. Collision strength B. Java Applets) D. Any Time. Updating the firewall configuration to include the patches C.www.CompTIA SY0-201: Practice Exam QUESTION NO: 245 Which of the following is the MOST significant flaw in Pretty Good Privacy (PGP) authentication? A." . Running a NIDS report to list the remaining vulnerabilities The MOST common exploits of Internet-exposed network services are due to: A. Determining which patches are needed. It is subject to a man-in-the-middle attack D. applying the patches and which of the following are three generally accepted activities of patch management? A. Auditing for the successful application of the patches D. Collision resistance "Pass Any Exam. Backing up the patch file executables to a network share B. Private keys can be compromised. Trojan horse programs C.

Collision metric Answer: B QUESTION NO: 249 Which of the following would be an example of a hardware device where keys can be stored? (Select TWO). AES D." . DES lTe Encryption is the conversion of data into a form. Passwords Answer: C "Pass Any Exam. PCI card B. ROT13 C. 3DES B. called a ciphertext that cannot be easily understood by unauthorized people. Collision strength D.co m 75 . Digital signatures C.com Ac tua A.C QUESTION NO: 250 Answer: C QUESTION NO: 251 The Diffie-Hellman encryption algorithm relies on which of the following? A. Tunneling B. Network interface card (NIC) Answer: B. Which encryption is the strongest by use of mathematical evaluation techniques? sts .www. PCMCIA card D.actualtests.CompTIA SY0-201: Practice Exam C. Any Time. Smart card C. A. Key exchange D.

Warm site C. Cold site B.com 76 Ac tua Your company has already implemented two-factor authentication and wants to install a third authentication factor. Virtualization C. Six digit PINs B. pki D. Hot site "Pass Any Exam.www.co m . Intrusion detection Answer: B QUESTION NO: 253 Non-repudiation is enforced by which of the following? A. Pass phrases C. Cipher block chaining Answer: B QUESTION NO: 254 A." . Elliptic curve Answer: C QUESTION NO: 255 Which of the following would be the MOST effective backup site for disaster recovery? A. Secret keys B. If the existing authentication system uses strong passwords and PKI tokens. Any Time. Kiting B. Digital signatures C. Fingerprint scanner D. Cloning D. which item would provide a third factor? lTe sts .actualtests.CompTIA SY0-201: Practice Exam QUESTION NO: 252 Which technology is able to isolate a host OS from some types of security threats? A.

Delta backup sts Which of the following describes backing up files and software that have changed since the last full or incremental backup? .co QUESTION NO: 257 m 77 . To detect network intrusions from external attackers C. Turnstile Answer: A Answer: C QUESTION NO: 258 Which is the primary objective to implement performance monitoring applications on network systems from a security standpoint? A. Incremental backup D. To detect integrity degradations to network attached storage D. To detect availability degradations caused by attackers Answer: D QUESTION NO: 259 "Pass Any Exam.actualtests. Full backup B.www." .com Ac tua lTe A.CompTIA SY0-201: Practice Exam D. To detect host intrusions from external networks B. Reciprocal agreement Answer: C QUESTION NO: 256 Which one of the following options will create a security buffer zone between two rooms? A. Differential backup C. Any Time. Anti-pass back C DMZ D. Mantrap B.

guidelines and enforcement.CompTIA SY0-201: Practice Exam Human resource department personnel should be trained about security policy: A. Faraday cage B. eradication Answer: B "Pass Any Exam. Any Time. Grounded wiring frame D.www.co m .actualtests. SQL injection B. containment D. Buffer overflows D. Mantrap C. monitoring and administration D. C. implementation Answer: A QUESTION NO: 260 Which of the following can affect heaps and stacks? A. repudiation C. B." . Cross-site scripting C. B. TEMPEST Answer: A QUESTION NO: 262 Which of the following is not a step in the incident response? A.com 78 Ac tua lTe sts . recovery. Rootkits Answer: C QUESTION NO: 261 An enclosure that prevents radio frequency signals from emanating out of a controlled environment is BEST described as which of the following? A. maintenance.

This is BEST described as: A.lx D.com Ac tua lTe A. Any Time. a clearance into a Top Secret compartment only allows access to certain information within that compartment. C. Role Based Access Control (RBAC) Answer: D QUESTION NO: 266 "Pass Any Exam. 802. 802. which of the following will allow wireless access to network resources? m 79 . acceptable use.11g sts . 802." . need to know.www. separation of duties D.CompTIA SY0-201: Practice Exam QUESTION NO: 263 In a classified environment. B. 802. Discretionary Access Control (DAC). C. This is known as A.11n C. Mandatory Access Control (MAC) D. dual control. B.co On the basis of certain ports. human resources personnel having slightly less access and managers having access to their own department files only.11a B. Answer: B QUESTION NO: 264 Answer: C QUESTION NO: 265 An organization has a hierarchical-based concept of privilege management with administrators having full access. Rule Based Access Control (RBAC).actualtests.

Sanitization C Degaussing D. Protocol analyzer D. Listening or overhearing parts of a conversation B. Networkmapper B. Destruction Answer: B QUESTION NO: 269 One of the below options are correct regarding the DDoS (Distributed Denial of Service) attack? A. FIN/RST C. Which one of the following processes is best to remove PII data from a disk drive before reuse? A." . B. Prevention access to resources by users authorized to use those resources Answer: C "Pass Any Exam.co m .CompTIA SY0-201: Practice Exam Identify the item that can determine which flags are set in a TCP/IP handshake? A. Contact the employee's supervisor regarding disposition of user accounts D.actualtests. SYN/ACK Answer: C QUESTION NO: 267 A representative from the human resources department informs a security specialist that an employee has been terminated. Any Time. Placing a computer system between the sender and receiver to capture information C.com 80 Ac tua lTe QUESTION NO: 268 sts Answer: A . Disable the employee's user accounts and delete all data.www. Use of multiple computers to attack a single organization D. Which of the following would be the BEST action to take? A. Change the employee's user password and keep the data for a specified period. Disable the employee's user accounts and keep the data for a specified period of time. C. Reformatting B.

A portion of the malware may have been removed by the IDS. Access control lists Answer: B QUESTION NO: 273 "Pass Any Exam. Answer: D QUESTION NO: 272 A graphical user interface (GUI) is a type of user interface which allows people to interact with electronic devices such as computers. B.co m 81 . hand-held devices such as MP3 Players. The administrator account was not secured. Which of the following will permit a technician to restrict a users?? access to the GUI? A. The malware may be running at a more privileged level than the antivirus software. C. Password policy enforcement D.400 connectors have not been password protected. Anonymous relays have not been disabled.actualtests. Use of logical tokens B. C. D. household appliances and office equipment. Portable Media Players or Gaming devices. X.com Ac tua lTe sts . The malware may be implementing a proxy server for command and control. The malware may be using a Trojan to infect the system. B. Group policy implementation C.www. Answer: D QUESTION NO: 271 An SMTP server is the source of email spam in an organization." . D. Which of the following is MOST likely the cause? A. Any Time. Remote access to the email application's install directory has not been removed.CompTIA SY0-201: Practice Exam QUESTION NO: 270 Why malware that uses virtualization techniques is difficult to detect? A.

com Ac tua lTe QUESTION NO: 275 sts . if a threat becomes known. Which item should be used by the technician? A. installing software patches. Private key of the receiver B. when the hardware or software is turned on. HIDS D. Public key of the receiver Answer: B Default passwords in hardware and software should be changed: A. when the vendor requires it Answer: C QUESTION NO: 276 An organization needs to monitor all network traffic as it traverses their network. B. Private key of the sender C.actualtests. Honeypot B. creating a security policy Answer: D QUESTION NO: 274 Which key is generally applied FIRST to a message digest to provide non-repudiation by use of asymmetric cryptography? A. vulnerability testing D. Any Time. B." .www. D.co m 82 . identifying the use case. Protocol analyzer C. C. once each month C. Content filter "Pass Any Exam.CompTIA SY0-201: Practice Exam The first step in creating a security baseline would be: A. Public key of the sender D.

D lTe A.www. An administrator uses a TCP/IP monitoring tool to discover that the accountant was actually using a spoofed banking website. Bluesnarfing C.com Ac QUESTION NO: 279 tua Answer: A. What most likely cause this attack? (Select TWO). Networkmapper D. VLAN B. Spyware Answer: B QUESTION NO: 278 Which of the following is employed to allow distrusted hosts to connect to services inside a network without allowing the hosts direct access to the internal networks? A. DNS poisoning sts . Demilitarized zone (DMZ) D.actualtests. Worm C.co An accountant has logged onto the company's outside banking website.CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 277 Which of the following types of programs autonomously replicates itself across networks? A." . m 83 . Any Time. Trojan horse B. Altered hosts file B. Virus D. Extranet C. Intranet Answer: C QUESTION NO: 280 "Pass Any Exam.

Which additional control can be performed? A.co m Which of the following BEST describes an attempt to transfer DNS zone data? 84 .com Ac tua lTe sts A. B. "Pass Any Exam. provide an unauthorized user with a place to safely work. Vulnerability scanner C. Reconnaissance . C. Your company requires you to improve the physical security of a data center located inside the office building. Defense-in-depth C. The data center already maintains a physical access log and has a video surveillance system. Any Time. Fraggle C. Teardrop D. Logical token D.actualtests. Mantrap Answer: D QUESTION NO: 281 Answer: D QUESTION NO: 282 Which method is the LEAST intrusive to check the environment for known software flaws? A. Protocol analyzer Answer: B QUESTION NO: 283 A honeypot is used to: A.CompTIA SY0-201: Practice Exam You work as a network administrator for your company." . give an unauthorized user time to complete an attack. trap attackers in a false network. Evasion B.www. Penetration test D. Port scanner B. ACL B.

A. which will be the most secure algorithm with the least CPU utilization? A. Applying patches Answer: C. Removing a user's access to the user's data. allow administrators a chance to observe an attack.co QUESTION NO: 285 m 85 . Disabling unnecessary services. C.com Ac tua lTe sts . HTTPS Answer: C Which of the following are components of host hardening? (Select TWO). AES C. B." . Configuring the Start menu and Desktop E. MD5 Answer: B QUESTION NO: 287 "Pass Any Exam. 3DES B. Answer: D QUESTION NO: 284 Which item can easily create an unencrypted tunnel between two devices? A. Adding users to the administrator group.E QUESTION NO: 286 In order to encrypt credit card data. Any Time. L2TP D.actualtests. AES C.CompTIA SY0-201: Practice Exam D. D. PPTP B. SHA-1 D.www.

Combination locks and key locks B. hybrid Answer: A QUESTION NO: 288 Which solution can be used by a user to implement very tight security controls for technicians that seek to enter the users' datacenter? A. RADIUS because it encrypts client-server passwords. downlevel. hierarchical D. Biometric reader and smartcard Answer: D QUESTION NO: 289 Answer: B QUESTION NO: 290 In a secure environment. RADIUS because it is a remote access authentication service. Smartcard and proximity readers C. "Pass Any Exam. which authentication mechanism performs better? A. John the Ripper B. WireShark C. Any Time. The model with no single trusted root is known as: A.com Ac A. B. peer-to-peer.actualtests." .CompTIA SY0-201: Practice Exam Pretty good privacy (PGP) uses a PKI Trust Model where no certificate authority (CA) is subordinate to another. Nessus tua Which of the following is a protocol analyzer? lTe sts .www. D. Cain _Abel D. B.co m 86 . C. C. TACACS because it is a remote access authentication service. TACACS because it encrypts client-server negotiation dialogs. Magnetic lock and pin D.

Any Time. RSA D.co m 87 .com Ac tua lTe sts . Performance C. Man In The Middle Answer: C QUESTION NO: 292 After auditing file. SHA-1 Answer: C QUESTION NO: 294 While monitoring application activity and modification. Application B. Security D." . which log will show unauthorized usage attempts? A. Replay Attack C. AES256 C. Back Door Attacks B. Elliptic Curve B. which system should be used? "Pass Any Exam.CompTIA SY0-201: Practice Exam Answer: B QUESTION NO: 291 Which of the following common attacks would the attacker capture the user's login information and replay it again later? A.actualtests. Spoofing D.www. System Answer: C QUESTION NO: 293 Which of the following encryption algorithms relies on the inability to factor large prime numbers? A.

Executive functions D. D. where the ARO equals the SLE. authentication verifies the identity of a user requesting credentials while identification verifies a set of credentials. the organization will accept. C. NIDS B.co m . Systems functions C. QUESTION NO: 296 The main objective of risk management in an organization is to reduce risk to a level: A." . Any Time.CompTIA SY0-201: Practice Exam A.com 88 Ac tua lTe sts Answer: C . B. the organization will mitigate. Answer: D QUESTION NO: 297 Following a disaster. authentication verifies a set of credentials while identification verifies the identity of a user requesting credentials. where the ALE is lower than the SLE.www. Least critical functions "Pass Any Exam. authentication verifies a user ID belongs to a specific user while identification verifies the identity of a user group. authentication verifies a set of credentials while identification verifies the identity of the network. which of the following functions should be returned FIRST from the backup facility to the primary facility? A. OVAL Answer: C QUESTION NO: 295 The difference between identification and authentication is that: A. C. B. Web services B. RADIUS C. D.actualtests. HIDS D.

To identify open ports on a system B. To assist with PKI implementation Answer: A QUESTION NO: 300 Your company's website permits customers to search for a product and display the current price and quantity available of each product from the production database." . Security template C. Public Answer: B QUESTION NO: 299 Which of the following is a reason to use a vulnerability scanner? A.actualtests. To identify remote access policies D. To assist with protocol analyzing C. Shared B. Which asymmetric key should be used by the executive to encrypt the signature? A. Private C. Hash D.co m 89 . NIPS B. Buffer overflow protection D.com Ac tua lTe sts . In addition to encrypting the body of the email. Any Time. Which of the following will invalidate an SQL injection attack launched from the lookup field at the web server level? A. the executive wants to encrypt the signature so that the assistant can verify that the email actually came from the executive.CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 298 PKI to encrypt sensitive emails sent to an assistant.www. Input validation Answer: D "Pass Any Exam.

What should be taken into consideration while implementing virtuaiization technology? "Pass Any Exam.co m . You should make sure that the virtuaiization technology is implemented securely. Any Time." . Risk assessment C. Which of the following can be used to explain the reasons a security review must be completed? tua lTe sts . Signature D. You have been asked to reconstruct the infrastructure of an organization.CompTIA SY0-201: Practice Exam QUESTION NO: 301 The FIRST step in creating a security baseline would be: A.www. identifying the use case B. Vulnerability assessment B. Need to know policy Answer: C QUESTION NO: 304 You work as a network technician. installing software patches C. Behavior Answer: C QUESTION NO: 303 A. Anomaly B. Corporate security policy D. D. The sales department has requested that the system become operational before a security review can be completed. creating a security policy Answer: D QUESTION NO: 302 Look at the following intrusion detection systems carefully. which one uses well defined models of how an attack occurs? A.com 90 Ac A computer system containing personal identification information is being implemented by a company's sales department. Protocol C. vulnerability testing.actualtests.

CompTIA SY0-201: Practice Exam A. The technician should perform penetration testing on all the virtual servers to monitor performance. UDP Attack C. C. Any Time. HTTPS B.actualtests. B. The technician should subnet the network so each virtual server is on a different network segment." . The technician should verify that the virtual servers and the host have the latest service packs and patches applied. Telnet D. TCP/IP Hijacking B.com 91 Ac tua lTe sts . Answer: B QUESTION NO: 305 Which of the following attacks are being referred to if the attack involves the attacker gaining access to a host in the network and logically disconnecting it? A. D.www. Smurf Attacks Answer: A QUESTION NO: 306 Which protocol can be used to ensure secure transmissions on port 443? A. HTTP "Pass Any Exam. The technician should verify that the virtual servers are dual homed so that traffic is securely separated.co m . SFTP Answer: A QUESTION NO: 307 Which of the following protocols is used to transmit data between a web browser and a web server? A. SSH B. SHTTP C. ICMP Attacks D.

" . Patch management QUESTION NO: 309 Answer: D QUESTION NO: 310 Which one of the following options overwrites the return address within a program to execute malicious code? A.www. A patch B. Any Time. IMAP4 Answer: B QUESTION NO: 308 Which method can be used to correct a single security issue on a workstation? A. System sts Which of the following logs shows when the workstation was last shutdown? . Configuration baseline C. SFTP D.co m Answer: A 92 . Rootkit C. A service pack D. Logic bomb D. DHCP B.actualtests. Security C. Access D. Privilege escalation Answer: A QUESTION NO: 311 "Pass Any Exam. Buffer overflow B.com Ac tua lTe A.CompTIA SY0-201: Practice Exam C.

personal software firewall. A program that obtains privileged access to the system. D. ICMP Attacks D. A program that provides software registration passwords or keys. Answer: B One of the below is a description for a password cracker. Any Time. HIPS B. Smurf Attacks Answer: B QUESTION NO: 312 Which security application can not proactively detect workstation anomalies? A." . TCP/IP Hijacking B. A qualitative measurement of risk and impact "Pass Any Exam.actualtests. antivirus software D. UDP Attack C. A program that can locate and read a password file. risk assessments should be based upon which of the following? A. B. An absolute measurement of threats B. NIDS C. which one is it? A. Answer: C QUESTION NO: 314 Risk assessment is a common first step in a risk management process. C. A program that performs comparative analysis. As a best practice.co m 93 .www.CompTIA SY0-201: Practice Exam Which of the following attacks are being referred to if packets are not connection-oriented and do not require the synchronization process? A.com Ac tua lTe QUESTION NO: 313 sts . Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat (also called hazard).

impact and asset value D. NIPS D. A quantitative measurement of risk.D QUESTION NO: 317 From the listing of attacks. Any Time." . Behavior-based monitoring Answer: A.com Ac tua lTe sts .CompTIA SY0-201: Practice Exam C.www. potential threats and asset value Answer: C QUESTION NO: 315 Which of the below options would you consider as a program that constantly observes data traveling over a network? A. Fragmenter D. Sniffer C. Buffer Overflow attack B.co m 94 . Smurfer B. SYN attack C. A survey of annual loss. Spoofer Answer: B QUESTION NO: 316 Which of the following will require setting a baseline? (Select TWO). Birthday attack Answer: B "Pass Any Exam. Signature-based monitoring C. choose the attack which exploits session initiation between a Transport Control Program (TCP) client and server within a network? A.actualtests. A. Anomaly-based monitoring B. Smurf attack D.

" . D. Any Time. A cipher can be reversed. A cipher produces the same size output for any input size. Protocol analyzer B. Port scanner C.actualtests.co m . Vulnerability scanner Answer: A QUESTION NO: 320 A.www. which analyzes how the operating system (OS) responds to specific network traffic. a hash does not. Cookies C. Answer: C QUESTION NO: 319 Which of the following assessment tools would be MOST appropriate for determining if a password was being sent across the network in clear text? A. a cipher cannot. Password cracker D. Licensing B. Multiple streams Answer: C QUESTION NO: 321 From the listing of attacks. in an attempt to determine the operating system running in your networking environment? "Pass Any Exam. A hash produces a variable output for any input size. A hash can be reversed.CompTIA SY0-201: Practice Exam QUESTION NO: 318 Which statement correctly describes the difference between a secure cipher and a secure hash? A. a cipher does not C. Data leakage D.com 95 Ac A peer-to-peer computer network uses diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application. a hash cannot. Which of the following is a security risk while using peer-to-peer software? tua lTe sts . B.

in an attempt to overload network servers. This is an example of which of the following? A. Man in the middle attack B. so that authorized users are denied access to network resources? sts QUESTION NO: 323 . Smurf attack C. C. Reverse engineering.CompTIA SY0-201: Practice Exam A." . multifactor authentication "Pass Any Exam. VLAN B. Any Time.www. B. which one is a collection of servers setup to attract hackers? A. SSO B. DMZ C. SYN (Synchronize) attack tua lTe From the listing of attacks.actualtests. Honeypot Answer: C Answer: D QUESTION NO: 324 Both the server and the client authenticate before exchanging datA. Honeynet D. Host hijacking. Fingerprinting D. Operating system scanning.co m 96 . choose the attack which misuses the TCP (Transmission Control Protocol) three-way handshake process.com Ac A. D. mutual authentication. biometrics C. Answer: C QUESTION NO: 322 For the following items. Teardrop attack D.

Man in the middle attack. Which of the following should the technician do to resolve the problem? A. Birthday attack. Disabled network interface on a server Answer: A One type of network attack sends two different messages that use the same hash function to generate the same message digest. Implement a policy to minimize the problem D." . D. Use Java virtual machines to reduce impact B.CompTIA SY0-201: Practice Exam Answer: C QUESTION NO: 325 A technician is helping an organization to correct problems with staff members unknowingly downloading malicious code from Internet websites. Ciphertext only attack.co m 97 . Decryption of encrypted network traffic D. Which network attack does this? A.actualtests. B. C.com Ac QUESTION NO: 327 tua lTe sts . Passive sniffing of local network traffic C. Answer: C QUESTION NO: 328 "Pass Any Exam. Disable unauthorized ActiveX controls C. Many malformed or fragmented packets B. Brute force attack. Install a NIDS Answer: B QUESTION NO: 326 A protocol analyzer will most likely detect which security related anomalies? A.www. Any Time.

form part of? A.www. Auto Answer: A QUESTION NO: 331 Which of the following is an installable package that includes several patches from the same vendor for various applications? "Pass Any Exam.co m .CompTIA SY0-201: Practice Exam In computing. Which device will you use to BEST utilize stateful packet inspection? A. Switch B. You have been studying stateful packet inspection and want to perform this security technique on the network. Trojan Horse Virus C. Hub C. Full-duplex d. Any Time. Half-duplex C. a stateful firewall (any firewall that performs stateful packet inspection (SPI) or stateful inspection) is a firewall that keeps track of the state of network connections (such as TCP streams. UDP communication) traveling across it. Stealth Virus D. ids D. Promiscuous B.com 98 Ac tua lTe sts . Polymorphic Virus B.actualtests." . Retrovirus Answer: C QUESTION NO: 330 The NIC should be placed in which mode to monitor all network traffic while placing a NIDS onto the network? A. Firewall Answer: D QUESTION NO: 329 To which of the following viruses does the characteristic when the virus will attempt to avoid detection by masking itself from applications. It may attach itself to the boot sector of the hard drive.

CompTIA SY0-201: Practice Exam A.actualtests.com Ac tua A. Companion Virus D. Multipartite Virus B. Patch rollup Answer: C QUESTION NO: 332 Which item can be commonly programmed into an application for ease of administration? A. Antivirus D. Phage Virus lTe To which of the following viruses does the characteristic when the virus may attempt to infect your boot sector." . Service pack D. HIDS C. Trojan C. Any Time. Zombie Answer: A Answer: A QUESTION NO: 334 Which of the following is MOST effective in preventing adware? A. Worm D.co m 99 . Back door B.www. Hotfix B. Patch template C. infect all of your executable files. Firewall B. and destroy your applications files form part of? sts QUESTION NO: 333 . Armored Virus C. Pop-up blocker Answer: D "Pass Any Exam.

UPS line conditioner. and backup generator . Worms self replicate while Trojan horses do not.www. You should install a host based IDS (Intrusion Detection System) Answer: B QUESTION NO: 336 Answer: D QUESTION NO: 337 Choose the statement that best details the difference between a worm and a Trojan horse? A.co m Choose the correct order in which crucial equipment should draw power. C. Employees should connect securely from home to the corporate network. You should prevent the execution of . C. Uninterruptible Power Supply (UPS) battery. Any Time. Backup generator. Worms are a form of malicious code while Trojan horses are not D. UPS battery. D. You should require root/administrator access to run programs and applications. Backup generator. There is no difference between a worm and a Trojan horse. Which encryption technology can be used to achieve this goal? A. your company has implemented a work from home program. Answer: B QUESTION NO: 338 Recently." . backup generator C.com 100 Ac tua lTe sts A. UPS line conditioner. UPS battery D. UPS line conditioner. L2TP B. You should enable scanning of all e-mail attachments. B. UPS battery. Worms are distributed through e-mail messages while Trojan horses do not.vbs files.CompTIA SY0-201: Practice Exam QUESTION NO: 335 Choose the most effective method of preventing computer viruses from spreading throughout the network. UPS line conditioner B. IPSec "Pass Any Exam.actualtests. . B. A.

co m Answer: D 101 . B." . A computer virus is a replication mechanism. D. C. D. Man in the middle attacks. Key distribution center lTe sts After the maximum number attempts have failed. A computer virus is a find mechanism. A computer virus is a search mechanism. which of the following could set an account to lockout for 30 minutes? . Dictionary attacks. Password complexity requirements D. pptp Answer: B QUESTION NO: 339 Choose the statement which best defines the characteristics of a computer virus. pppoE D. QUESTION NO: 340 Answer: B QUESTION NO: 341 Choose the attack or malicious code that cannot be prevented or deterred solely through using technical measures. contamination mechanism and can exploit. C. Any Time. connection mechanism and can integrate. A. Account lockout duration C.actualtests. activation mechanism and has an objective. A computer virus is a learning mechanism. Answer: D "Pass Any Exam.com Ac tua A. B. Account lockout threshold B. initiation mechanism and can propagate.www.CompTIA SY0-201: Practice Exam C. DoS (Denial of Service) attacks. A. Social engineering.

B." . Cell phone B. The files. Uninterruptible Power Supply (UPS) C.actualtests. or by a mesh of such material. Which of the following would a Faraday cage prevent usage of? A.CompTIA SY0-201: Practice Exam QUESTION NO: 342 A Faraday cage or Faraday shield is an enclosure formed by conducting material.co An Auditing system is necessary to prevent attacks on what part of the system? m QUESTION NO: 343 . A. Any Time. AES256 C. Elliptic Curve Answer: C QUESTION NO: 345 Choose the network mapping tool (scanner) which uses ICMP (Internet Control Message Protocol). USB key Answer: A Answer: A QUESTION NO: 344 Which encryption algorithm depends on the inability to factor large prime numbers? A. The operating system. RSA D.www. who built one in 1836. Such an enclosure blocks out external static electrical fields. C. SHA-1 B. "Pass Any Exam.com 102 Ac tua lTe sts A. Storage drive D. None of the above . Faraday cages are named after physicist Michael Faraday. The systems memory D. A port scanner.

RAID 5 drive array D. which one usually applies specifically to a web browser? A. A map scanner. A share scanner. Which type of port scan can perform this set of actions? A.com Ac tua lTe sts . Any Time." . Anti-spyware B. Uninterruptible Power Supply (UPS) Answer: B "Pass Any Exam. Redundant ISP C. and can then perform a two way handshake. Personal software firewall D.actualtests.CompTIA SY0-201: Practice Exam B. Redundant servers B. Antivirus Answer: B QUESTION NO: 347 One type of port scan can determine which ports are in a listening state on the network. A TCP (transmission Control Protocol) SYN (Synchronize) scan B. A TCP (transmission Control Protocol) connect scan C. A TCP (transmission Control Protocol) fin scan D. D. Answer: C QUESTION NO: 346 Look at the following items. A TCP (transmission Control Protocol) null scan Answer: A QUESTION NO: 348 Which one of the following options will allow for a network to remain operational after a Tl failure? A. A ping scanner. C.co m 103 . Pop-up blocker C.www.

are used to make connections between private networks across a public network.com Ac tua QUESTION NO: 351 lTe sts . vpn D.www. SLIP (Serial Line Internet Protocol) B. TPM B. Has largely replaced SLIP and offers multiple protocol support including AppleTalk.co m 104 . is a mechanism that allows authentication of dial-in and other network connections Answer: D QUESTION NO: 352 Which description is correct about a tool used by organizations to verify whether or not a staff member has been involved in malicious activity? "Pass Any Exam. pgp C. IPX.actualtests. andDECnet C. a pre-shared key or PSK is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used." . Digital signature D. CA Answer: B Which of the following definitions fit correctly to RADIUS? A. such as the Internet D. RADIUS (Remote Authentication Dial-In User Service) Answer: B QUESTION NO: 350 In cryptography. PPP (Point-to-Point Protocol) C. Any Time.CompTIA SY0-201: Practice Exam QUESTION NO: 349 Which of the following has largely replaced SLIP? A. Is an older protocol that was used in early remote access environments B. Pre-shared keys can be applied to which of the following? A.

Discretionary Access Control (DAC) Answer: D QUESTION NO: 355 Which of the following needs to be backed up on a domain controller to be able to recover Active Directory? A. User date C. Rule-Based Access control (RBAC) D. System state D. Implicit deny D. Mandatory vacations B. IPX. such as the Internet D. are used to make connections between private networks across a public network. andDECnet C. Has largely replaced SLIP and offers multiple protocol support including AppleTalk.www.com Ac tua lTe sts . Role-Based Access Control (RBAC) C.CompTIA SY0-201: Practice Exam A. including Kerberos. Answer: D QUESTION NO: 354 Which access control method gives the owner control over providing permissions? A." . Is an older protocol that was used in early remote access environments B.actualtests. Any Time. Operating system "Pass Any Exam. Implicit allow Answer: A QUESTION NO: 353 Which of the following definitions fit correctly to TACACS? A. Mandatory Access Control (MAC) B. System files B.co m 105 . It allows credentials to be accepted from multiple methods. Time of day restrictions C.

TCP/IP hijacking B. False acceptance B. It is a tunneling protocol originally designed for UNIX systems.co m .com 106 Ac tua lTe A. "Pass Any Exam. sts . It was created by Cisco as a method of creating tunnels primarily for dial-up connections C. DDoS D. DoS C.actualtests." .CompTIA SY0-201: Practice Exam Answer: C QUESTION NO: 356 Which item best describes an instance where a biometric system identifies legitimate users as being unauthorized? A. False rejection D. It is primarily a point-to-point protocol D. which two are VPN (Virtual Private Network) tunneling protocols? Choose two protocols. It supports encapsulation in a single point-to-point environment B. Any Time. False negative Answer: C QUESTION NO: 357 Which of the following definitions fit correctly to PPTP? Answer: A QUESTION NO: 358 Which one of the following options is an attack launched from multiple zombie machines in attempt to bring down a service? A. Man-in-the-middle Answer: C QUESTION NO: 359 From the list of protocols.www. False positive C.

D. D. Answer: C.actualtests. Perform hashing of the log files. C. B.com 107 Ac tua lTe sts . "Pass Any Exam. Port 49 Answer: D QUESTION NO: 362 Which security measures should be recommended while implementing system logging procedures? (Select TWO). false negative.E QUESTION NO: 360 Which of the following is correct about an instance where a biometric system identifies unauthorized users and allows them access? A. D. L2TP (Layer Two Tunneling Protocol). PPP (Point-to-Point Protocol). E. Port 161 C. A. Perform CRC checks. B. PPTP (Point-to-Point Tunneling Protocol). Answer: C QUESTION NO: 361 You work as the security administrator at Certkiller. Apply retention policies on the log files. B. Collect system temporary files. Which port(s) should you open on the firewall? A.co m .www. false rejection. C. SMTP (Simple Mail Transfer Protocol). Port 53 D. Port 21 B.CompTIA SY0-201: Practice Exam A.com." . C. Any Time. SLIP (Serial Line Internet Protocol). false positive. false acceptance. You must configure the firewall to support TACACS.

B. C." . utp D. Answer: C QUESTION NO: 366 Tom is a network administrator of his company. Trojan Horse. Polymorphic Virus. Trojan Horse C. D. Any Time. The file server does not have logging enabled. STP . He suspects that files are being copied to a remote location during off hours. Repudiation Attack.CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 363 Which of the following network attacks cannot occur in an e-mail attack? A. Polymorphic Virus Answer: A QUESTION NO: 364 Answer: A QUESTION NO: 365 A.com 108 Ac Which of the following attacks are being referred to if someone is accessing your e-mail server and sending inflammatory information to others? tua lTe sts A. Which logs will be the BEST place to look for information? "Pass Any Exam. Fiber B.actualtests. Coaxial C. Phage Virus.co Which media is LEAST susceptible to a tap being placed on the line? m . Dictionary attack B. Phage Virus D.www.

" . True B. False lTe sts . Intrusion detection logs Answer: B QUESTION NO: 367 A technician is auditing the security posture of an organization. DNS logs D. Implementing a host based intrusion prevention system Answer: C QUESTION NO: 368 Job rotation is a cross-training technique where organizations minimize collusion amongst staff. Changing the user rights and security groups D. The audit shows that many of the users have the ability to access the company's accounting information. Answer: A QUESTION NO: 369 A security specialist is reviewing firewall logs and sees the information below.actualtests.CompTIA SY0-201: Practice Exam A. Antivirus logs B. Firewall logs C. Which of the following should the technician recommend to address this problem? A.www. Any Time.com Ac tua A.co m 109 . Changing file level audit settings B. Which of the following BEST describes the attack that is occurring? "Pass Any Exam. Implementing a host based intrusion detection system C.

Answer: C "Pass Any Exam.actualtests. Simulating an actual attack on a network B. Hacking into a network for malicious reasons D. D.www. The domain controller's logs. Establishing a security baseline C. Port scan D. The target computer's audit logs. Detecting active intrusions Answer: A QUESTION NO: 371 Which of the following would be MOST useful in determining which internal user was the source of an attack that compromised another computer in its network? A.CompTIA SY0-201: Practice Exam A. ARP poisoning B. PING sweep Answer: C QUESTION NO: 370 Which description is true about penetration testing? A. The firewall's logs B.co m 110 .com Ac tua lTe sts . Any Time." . DNS spoofing C. The attacking computer's audit logs C.

Notify you that a message carries a virus. MD5 C. E-mail B. 443 D. Mass storage devices Answer: A QUESTION NO: 374 A. 636 Answer: D QUESTION NO: 375 Which of the following definitions should BEST suit the functions of an e-mail server? A. A user needs to implement secure LDAP on the network.actualtests. Floppy C." . 53 B. Which port number will secure LDAP use by default? lTe sts .CompTIA SY0-201: Practice Exam QUESTION NO: 372 Which encryption algorithms can be used to encrypt and decrypt data? A. "Pass Any Exam. SHA-l D. CD-Rom D. 389 C. Any Time.com 111 Ac tua The Lightweight Directory Access Protocol or LDAP is an application protocol for querying and modifying directory services running over TCP/IP.co m . Detect the viruses in the messages received from various sources and send warnings to the recipient to warn him/her of the risky mail. B. NTLM B. RC5 Answer: D QUESTION NO: 373 By which means do most network bound viruses spread? A.www.

Open the port on the VLAN. D. Open the port on the company's firewall. Answer: A QUESTION NO: 376 On a company's LAN. A third party mail relay limits access to specific users. D. C.www. A. Answer: A QUESTION NO: 378 Which method is the easiest to disable a 10Base2 network? A. Forms a platform on which messages are sent. C. B.D Choose the primary disadvantage of using a third party mail relay.CompTIA SY0-201: Practice Exam C. A third party mail relay restricts spammers from gaining access.co m 112 . Install a zombie. Change the users subnet mask.actualtests. Answer: B. B. D. port 3535 is typically blocked for outbound traffic. A. Open the port on the users personal software firewall. Spammers can utilize the third party mail relay.com Ac tua lTe sts QUESTION NO: 377 . Remove a terminator. B. Any Time. Answer: C "Pass Any Exam. Introduce crosstalk. C. A third party mail relay restricts the types of e-mail that maybe sent." . Makes use of a port used specifically for messages to be sent through. D. Remove a vampire tap. An end-user has recently purchased a legitimate business program that needs to make outbound calls through this port Which step should be taken by a technician to allow this? (Select TWO).

com Ac On the topic of comparing viruses and hoaxes.co m 113 . Answer: A QUESTION NO: 382 The purpose of a DNS server is to enable people and applications to lookup records in DNS tables. System files D. Hoaxes can create as much damage as a real virus. D. C. D. Why implement security logging on a DNS server? "Pass Any Exam. Hoaxes can help educate users about a virus. Temporary Internet files B. S/MIME allows users to send e-mail messages with a return receipt. S/MIME allows users to send anonymous e-mail messages. Any Time.CompTIA SY0-201: Practice Exam QUESTION NO: 379 Choose the option that details one of the primary benefits of using S/MIME /Secure Multipurpose Internet Mail Extension)? A. C. tua lTe sts .www. B. S/MIME allows users to send both encrypted and digitally signed e-mail messages.actualtests. S/MIME expedites the delivery of e-mail messages." . A HIDS is installed to monitor which of following? A. Hoaxes are harmless pranks and should be ignored. CPU performance C. NIC performance Answer: C QUESTION NO: 381 A. Answer: A QUESTION NO: 380 Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. which statement is TRUE? Choose the best TRUE statement. B. Hoaxes carry a malicious payload and can be destructive.

actualtests.com Ac tua A. To measure the DNS server performance D. SMTP Relay Answer: A "Pass Any Exam. To monitor unauthorized zone transfers B. D.CompTIA SY0-201: Practice Exam A. C. Virus lTe Which security threat will affect PCs and can have its software updated remotely by a command and control center? sts QUESTION NO: 384 .co m 114 . Asymmetric scheme B. Symmetric scheme C.www. To control unauthorized DNSDoS C. Symmetric key distribution system D. Worm D. Any Time. cgi. Asymmetric key distribution system Answer: A Answer: A QUESTION NO: 385 Which of the following web vulnerabilities is being referred to when it receives more data than it is programmed to accept? A. A. Cookies. Adware C. B." . To perform penetration testing on the DNS server Answer: A QUESTION NO: 383 Choose the scheme or system used by PGP (Pretty Good Privacy) to encrypt data. Buffer Overflows. Zombie B.

To isolate the various network services and roles D. A password generator B. Any Time. Time of day restrictions D." . A networkmapper C. Password complexity requirements B. A rainbow table Answer: D QUESTION NO: 387 Which of the following is a security reason to implement virtualization throughout the network infrastructure? A.actualtests. Disabling SSID broadcast C. Changing default passwords Answer: A QUESTION NO: 389 Which of the following web vulnerabilities is being referred to when it has a feature designed into many e-mail servers that allows them to forward e-mail to other e-mail servers? "Pass Any Exam.CompTIA SY0-201: Practice Exam QUESTION NO: 386 Which of the following will permit an administrator to find weak passwords on the network? A. To centralize the patch management of network servers C.com Ac tua lTe sts . A hash function D. To analyze the various network traffic with protocol analyzers B. To implement additional network services at a lower cost Answer: C QUESTION NO: 388 Which security measure should be used while implementing access control? A.www.co m 115 .

CompTIA SY0-201: Practice Exam A. Spoofing B. icons. cgi D. It is a programming language that allows access to system resources of the system running the script B. Kiting Answer: D QUESTION NO: 391 Answer: B QUESTION NO: 392 A programmer plans to change the server variable in the coding of an authentication function for a proprietary sales application. SMTP Relay Answer: D QUESTION NO: 390 Study the following items carefully.actualtests. Domain hijacking D. Secure disposal C. Cookies. It allows customized controls. It can also include a digital signature to verify authenticity D. C." . Password complexity "Pass Any Exam. and other features to increase the usability of web enabled systems tua lTe Which of the following definitions BEST suit Java Applet? sts . Change management B. Buffer Overflows. Any Time. DNS poisoning C. B. which one will permit a user to float a domain registration for a maximum of five days? A.www. The client browser must have the ability to run Java applets in a virtual machine on the client C.com 116 Ac A.co m . Which process should be followed before implementing the new routine on the production application server? A.

" .actualtests. It has a feature designed into many e-mail servers that allows them to forward e-mail to other email servers QUESTION NO: 394 Answer: A QUESTION NO: 395 An end-to-end traffic performance guarantee made by a service provider to a customer is a: A. B. It is used to provide a persistent.www. C. Chain of custody Answer: A QUESTION NO: 393 Which of the following definitions BEST suit Buffer Overflow? A. Deluge sprinkler C.co m Answer: A 117 . VPN Answer: C QUESTION NO: 396 "Pass Any Exam. Hydrogen Peroxide D. B. SLA. Any Time. DRP. Which type of fire suppression system should be used? . BCP. It's an older form of scripting that was used extensively in early web systems D.com Ac tua A. It receives more data than it is programmed to accept. customized web experience for each visit. Wet pipe sprinkler lTe sts An administrator wants to make sure that no equipment is damaged when encountering a fire or false alarm in the server room. Carbon Dioxide B. C.CompTIA SY0-201: Practice Exam D. D.

Implicit deny B. which of the following is a countermeasure? A. When files are stored on a workstation. Uninterruptible power supplies (UPSs) Answer: A QUESTION NO: 399 Which of the following statements are true regarding File Sharing? A." .CompTIA SY0-201: Practice Exam The staff must be cross-trained in different functional areas in order to detect fraud. Which of the following is an example of this? A.co m . the connection is referred to as a peer-to-peer connection. As discussed earlier. Security was based on the honor system. Separation of duties D. a client. Redundant power supplies D. "Pass Any Exam. FTP is a protocol. SSH is a program that allows connections to be secured by encrypting the session between the client and the server. A hash function C.actualtests. Any Time. Job rotation Answer: D QUESTION NO: 397 Which of the following would allow an administrator to find weak passwords on the network? A. A rainbow table Answer: D When power must be delivered to critical systems. B. Warm site C. D. Backup generator B. A password generator D.com 118 Ac tua lTe QUESTION NO: 398 sts .www. C. and a server. Least privilege C. A networkmapper B.

The DRP coordinator C.CompTIA SY0-201: Practice Exam Answer: D QUESTION NO: 400 Who is finally in charge of the amount of residual risk? A.co m 119 . Any Time.www." .actualtests. The security technician D.com Ac tua lTe sts . The organizations security officer Answer: A "Pass Any Exam. The senior management B.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->