SY0-301 Braindumps

Latest 2013 CompTIA Security+ SY0-301 exam questions (11-15)

QUESTION 11
Which of the following risks may result from improper use of social networking and P2P software?

A.Shoulder surfing
B.Denial of service
C.Information disclosure
D.Data loss prevention

Answer: C

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 6 (26-30)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 6

QUESTION 26
A company wants to ensure that its hot site is prepared and functioning. Which of the foll

owing

would be the BEST process to verily the backup datacenter is prepared for such a scenario?
A. Site visit to the backup data center
B. Disaster recovery plan review
C. Disaster recovery exercise
D. Restore from backup
Answer: C

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 6 (21-25)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 6

QUESTION 21
Which of the following would Matt, a security administrator, use to encrypt transmi

ssions from an internal database to an internal server, keeping in mind that the encryption process must add as little latency to the process as possible?
A. ECC
B. RSA
C. SHA
D. 3DES
Answer: D

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 6 (16-20)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 6

QUESTION 16
Matt, a forensic analyst, wants to obtain the digital fingerprint for a given messa

ge. The message is 160-bits long. Which of the following hashing methods would Matt have to use to obtain this digital fingerprint?
A. SHA1
B. MD2
C. MD4
D. MD5
Answer: A

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 6 (11-15)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 6

QUESTION 11
Which of the following would Sara, a security administrator, implement to divert and analyze attacks?
A. Protoco

l analyzer
B. DMZ
C. Port scanner
D. Honeypot
Answer: D

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 6 (6-10)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 6

QUESTION 6
Sara, a security engineer, is testing encryption ciphers for performance. Which of the following ciphers offers strong encryption with t

he FASTEST speed?
A. 3DES
B. Blowfish
C. Serpent
D. AES256
Answer: B

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 6 (1-5)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 6

QUESTION 1
Which of the following mitigation techniques is Pete, a security administrator, MOST likely to implement after the software has been relea

sed to the public?
A. Error and exception handling
B. Fuzzing
C. Secure coding
D. Patch management
Answer: D

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 5 (46-50)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 5

QUESTION 46
Which of the following allows multiple internal IP addresses to be mapped to one specific external IP address?
A. &nbsp

; VLAN
B. NAT
C. NAC
D. PAT
Answer: D

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 5 (41-45)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 5

QUESTION 41
Which of the following detection methods may generate an alert when Matt, an employee, accesses a server during non-business hours?

A. Signature
B. Time of Day restrictions
C. Heuristic
D. Behavioral
Answer: D

(more…)

Latest CompTIA Security+ SY0-301 – Chapter 5 (36-40)

CompTIA Security+ SY0-301 Dump Questions and Answers – Chapter 5

QUESTION 36
Matt, the network engineer, has been tasked with separating network traffic between virtual
machines on a single hypervisor. Which o

f the following would he implement to BEST address this requirement? (Select TWO).
A. Virtual switch
B. NAT
C. System partitioning
D. Access-list
E. Disable spanning tree
F. VLAN
Answer: AF

(more…)

Page 1 of 41234
Go to Top