CompTIA
Exam SY0-401
CompTIA Security+ Certification
Version: Demo
[ Total Questions: 10 ]
Topic Break Down
Topic 2, Volume B
Question No : 1 - (Topic 2)
A small business needs to incorporate fault tolerance into their infrastructure to increase data availability. Which of the following options would be the BEST solution at a minimal
cost?
A. Clustering
B. Mirrored server
C. RAID
D. Tape backup
Answer: C
Question No : 2 - (Topic 2)
An auditing team has found that passwords do not meet best business practices. Which of the following will MOST increase the security of the passwords?
(Select TWO).
A. Password Complexity
B. Password Expiration
C. Password Age
D. Password Length
E. Password History
Answer: A,D
Topic 4, Volume D
Question No : 3 - (Topic 4)
Which of the following is the MOST specific plan for various problems that can arise within a system?
A. Business Continuity Plan
B. Continuity of Operation Plan
C. Disaster Recovery Plan
D. IT Contingency Plan
Answer: D
Question No : 4 - (Topic 4)
Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall application but does not have all the details. Jane needs to review the
software before it is released to production. Which of the following reviews should Jane conduct?
A. Gray Box Testing
B. Black Box Testing
C. Business Impact Analysis
D. White Box Testing
Answer: A
Topic 5, Volume E
Question No : 5 - (Topic 5)
A security administrator is responsible for performing periodic reviews of user permission
settings due to high turnover and internal transfers at a corporation. Which of the following
BEST describes the procedure and security rationale for performing such reviews?
A. Review all user permissions and group memberships to ensure only the minimum set of permissions required to perform a job is assigned.
B. Review the permissions of all transferred users to ensure new permissions are granted so the employee can work effectively.
C. Ensure all users have adequate permissions and appropriate group memberships, so the volume of help desk calls is reduced.
D. Ensure former employee accounts have no permissions so that they cannot access any network file stores and resources.
Answer: A
Topic 7, Volume G
Question No : 6 - (Topic 7)
Configuring key/value pairs on a RADIUS server is associated with deploying which of the following?
A. WPA2-Enterprise wireless network
B. DNS secondary zones
C. Digital certificates
D. Intrusion detection system
Answer: A
Topic 8, Volume H
Question No : 7 - (Topic 8)
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario?
A. Application Firewall
B. Anomaly Based IDS
C. Proxy Firewall
D. Signature IDS
Answer: B
Topic 10, Volume J
Question No : 8 - (Topic 10)
Which of the following protocols would be implemented to secure file transfers using SSL?
A. TFTP
B. SCP
C. SFTP
D. FTPS
Answer: D
Question No : 9 - (Topic 10)
In the Windows world, what tool is used to disable a port?
A. System Manager
B. System Monitor
C. Performance Monitor
D. Windows Firewall
Answer: D
Question No : 10 - (Topic 10)
Which of the following wireless protocols could be vulnerable to a brute-force password attack?
(Select TWO).
A. WPA2-PSK
B. WPA - EAP - TLS
C. WPA2-CCMP
D. WPA -CCMP
E. WPA - LEAP
F. WEP
Answer: A,E

