Free Download Latest 2014 Pass4sure&Lead2pass CompTIA SY0-401 Dumps (171-180)

QUESTION 171
In which of the following scenarios is PKI LEAST hardened?

A.    The CRL is posted to a publicly accessible location.
B.    The recorded time offsets are developed with symmetric keys.
C.    A malicious CA certificate is loaded on all the clients.
D.    All public keys are accessed by an unauthorized user.

Answer: C

QUESTION 172
Configuring the mode, encryption methods, and security associations are part of which of the following?

A.    IPSec
B.    Full disk encryption
C.    802.1x
D.    PKI

Answer: A

QUESTION 173
Which of the following assessments would Pete, the security administrator, use to actively test that an application’s security controls are in place?

A.    Code review
B.    Penetration test
C.    Protocol analyzer
D.    Vulnerability scan

Answer: B

QUESTION 174
A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?

A.    Confidentiality
B.    Availability
C.    Succession planning
D.    Integrity

Answer: B

QUESTION 175
In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager. Which of the following incident response procedures would he need to perform in order to begin the analysis? (Select TWO).

A.    Take hashes
B.    Begin the chain of custody paperwork
C.    Take screen shots
D.    Capture the system image
E.    Decompile suspicious files

Answer: AD

QUESTION 176
Which of the following is used to certify intermediate authorities in a large PKI deployment?

A.    Root CA
B.    Recovery agent
C.    Root user
D.    Key escrow

Answer: A

QUESTION 177
Which of the following components MUST be trusted by all parties in PKI?

A.    Key escrow
B.    CA
C.    Private key
D.    Recovery key

Answer: B

QUESTION 178
Which of the following should Matt, a security administrator, include when encrypting smartphones? (Select TWO).

A.    Steganography images
B.    Internal memory
C.    Master boot records
D.    Removable memory cards
E.    Public keys

Answer: BD

QUESTION 179
Which of the following is the below pseudo-code an example of?
IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT

A.    Buffer overflow prevention
B.    Input validation
C.    CSRF prevention
D.    Cross-site scripting prevention

Answer: B

QUESTION 180
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?

A.    RADIUS
B.    TACACS+
C.    Kerberos
D.    LDAP

Answer: B

If you want to pass CompTIA SY0-401 successfully, donot missing to read latest lead2pass CompTIA SY0-401 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/SY0-401.html

         

Comments are closed.