Get Free Latest Dumps For CompTIA SY0-301 Exam And Quickly Pass Exam

QUESTION 1
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire?

A.    Install a proxy server between the users’ computers and the switch to filter inbound network traffic.
B.    Block commonly used ports and forward them to higher and unused port numbers.
C.    Configure the switch to allow only traffic from computers based upon their physical address.
D.    Install host-based intrusion detection software to monitor incoming DHCP Discover requests.

Answer: C

QUESTION 2
Hotspot Question
Select the appropriate attack from each drop down list to label the corresponding illustrated attack
Instructions: Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit.
 clip_image002[1]_thumb_thumb_thumb_thumb_thumb
Answer:
 clip_image002[3]_thumb_thumb_thumb_thumb_thumb

QUESTION 3
A technician wants to implement a dual factor authentication system that will enable the organization to authorize access to sensitive systems on a need-to-know basis. Which of the following should be implemented during the authorization stage?

A.    Biometrics
B.    Mandatory access control
C.    Single sign-on
D.    Role-based access control

Answer: A

QUESTION 4
A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file was found on an underused server and appears to contain a zero-day exploit. Which of the following can the researcher do to determine if the file is malicious in nature?

A.    TCP/IP socket design review
B.    Executable code review
C.    OS Baseline comparison
D.    Software architecture review

Answer: C

QUESTION 5
Lab Sim – Configure the Firewall
Task: Configure the firewall (fill out the table) to allow these four rules:
– Only allow the Accounting computer to have HTTPS access to the Administrative server.
– Only allow the HR computer to be able to communicate with the Server 2 System over SCP.
– Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2
 clip_image002[5]_thumb_thumb_thumb_thumb_thumb
 clip_image002[7]_thumb_thumb_thumb_thumb_thumb
Answer:
Use the following answer for this simulation task. Below table has all the answers required for this question.
 clip_image002[9]_thumb_thumb_thumb_thumb_thumb

QUESTION 6
Drag and Drop Question
You have been tasked with designing a security plan for your company.
Drag and drop the appropriate security controls on the floor plan.
Instructions:
All objects must be used and all place holders must be filled Order does not matter
When you have completed the simulation, please select the Done button to submit.
 clip_image002[11]_thumb_thumb_thumb_thumb_thumb
Answer:
 clip_image002[13]_thumb_thumb_thumb_thumb_thumb

QUESTION 7
Matt, the network engineer, has been tasked with separating network traffic between virtual machines on a single hypervisor. Which of the following would he implement to BEST address this requirement? (Select TWO).

A.    Virtual switch
B.    NAT
C.    System partitioning
D.    Access-list
E.    Disable spanning tree
F.    VLAN

Answer: AF

QUESTION 8
Which of the following BEST describes a demilitarized zone?

A.    A buffer zone between protected and unprotected networks.
B.    A network where all servers exist and are monitored.
C.    A sterile, isolated network segment with access lists.
D.    A private network that is protected by a firewall and a VLAN.

Answer: A

QUESTION 9
XYZ Corporation is about to purchase another company to expand its operations. The CEO is concerned about information leaking out, especially with the cleaning crew that comes in at night. The CEO would like to ensure no paper files are leaked. Which of the following is the BEST policy to implement?

A.    Social media policy
B.    Data retention policy
C.    CCTV policy
D.    Clean desk policy

Answer: D

QUESTION 10
The administrator would like to implement hardware assisted full disk encryption on laptops. Which of the following would MOST likely be used to meet this goal?

A.    TPM
B.    USB Drive
C.    Key Escrow
D.    PKI

Answer: A

QUESTION 11
A security administrator wants to check user password complexity. Which of the following is the BEST tool to use?

A.    Password history
B.    Password logging
C.    Password cracker
D.    Password hashing

Answer: C

QUESTION 12
Certificates are used for: (Select TWO).

A.    Client authentication.
B.    WEP encryption.
C.    Access control lists.
D.    Code signing.
E.    Password hashing.

Answer: AD

QUESTION 13
Which of the following is a hardware based encryption device?

A.    EFS
B.    TrueCrypt
C.    TPM
D.    SLE

Answer: C

QUESTION 14
Which of the following BEST describes a protective countermeasure for SQL injection?

A.    Eliminating cross-site scripting vulnerabilities
B.    Installing an IDS to monitor network traffic
C.    Validating user input in web applications
D.    Placing a firewall between the Internet and database servers

Answer: C

QUESTION 15
Which of the following MOST interferes with network-based detection techniques?

A.    Mime-encoding
B.    SSL
C.    FTP
D.    Anonymous email accounts

Answer: B

QUESTION 16
A UNIX administrator would like to use native commands to provide a secure way of connecting to other devices remotely and to securely transfer files. Which of the following protocols could be utilized? (Select TWO).

A.    RDP
B.    SNMP
C.    FTP
D.    SCP
E.    SSH

Answer: DE

QUESTION 17
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

A.    Logic bomb
B.    Worm
C.    Trojan
D.    Adware

Answer: C

QUESTION 18
Which of the following would Matt, a security administrator, use to encrypt transmissions from an internal database to an internal server, keeping in mind that the encryption process must add as little latency to the process as possible?

A.    ECC
B.    RSA
C.    SHA
D.    3DES

Answer: D

QUESTION 19
Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?

A.    Error and exception handling
B.    Application hardening
C.    Application patch management
D.    Cross-site script prevention

Answer: B

QUESTION 20
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?

A.    RIPEMD
B.    MD5
C.    SHA
D.    HMAC

Answer: D
Download the Latest CompTIA SY0-301 Exam Dumps from Braindump2go

http://www.braindump2go.com/sy0-301.html 

         

Categories CompTIA Exam

Post Author: mavis

Categories

Archives

Cisco Exam Dumps Download

200-301 PDF and VCE Dumps

200-901 PDF and VCE Dumps

350-901 PDF and VCE Dumps

300-910 PDF and VCE Dumps

300-915 PDF and VCE Dumps

300-920 PDF and VCE Dumps

350-401 PDF and VCE Dumps

300-410 PDF and VCE Dumps

300-415 PDF and VCE Dumps

300-420 PDF and VCE Dumps

300-425 PDF and VCE Dumps

300-430 PDF and VCE Dumps

300-435 PDF and VCE Dumps

350-401 PDF and VCE Dumps

350-401 PDF and VCE Dumps

350-801 PDF and VCE Dumps

300-810 PDF and VCE Dumps

300-815 PDF and VCE Dumps

300-820 PDF and VCE Dumps

300-835 PDF and VCE Dumps

350-801 PDF and VCE Dumps

200-201 PDF and VCE Dumps

350-601 PDF and VCE Dumps

300-610 PDF and VCE Dumps

300-615 PDF and VCE Dumps

300-620 PDF and VCE Dumps

300-625 PDF and VCE Dumps

300-635 PDF and VCE Dumps

600-660 PDF and VCE Dumps

350-601 PDF and VCE Dumps

352-001 PDF and VCE Dumps

350-701 PDF and VCE Dumps

300-710 PDF and VCE Dumps

300-715 PDF and VCE Dumps

300-720 PDF and VCE Dumps

300-725 PDF and VCE Dumps

300-730 PDF and VCE Dumps

300-735 PDF and VCE Dumps

350-701 PDF and VCE Dumps

350-501 PDF and VCE Dumps

300-510 PDF and VCE Dumps

300-515 PDF and VCE Dumps

300-535 PDF and VCE Dumps

350-501 PDF and VCE Dumps

010-151 PDF and VCE Dumps

100-490 PDF and VCE Dumps

810-440 PDF and VCE Dumps

820-445 PDF and VCE Dumps

840-450 PDF and VCE Dumps

820-605 PDF and VCE Dumps

700-805 PDF and VCE Dumps

700-070 PDF and VCE Dumps

600-455 PDF and VCE Dumps

600-460 PDF and VCE Dumps

500-173 PDF and VCE Dumps

500-174 PDF and VCE Dumps

200-401 PDF and VCE Dumps

644-906 PDF and VCE Dumps

600-211 PDF and VCE Dumps

600-212 PDF and VCE Dumps

600-210 PDF and VCE Dumps

600-212 PDF and VCE Dumps

700-680 PDF and VCE Dumps

500-275 PDF and VCE Dumps

500-285 PDF and VCE Dumps

600-455 PDF and VCE Dumps

600-460 PDF and VCE Dumps

Microsoft Exams Will Be Retired

AZ-103(retiring August 31, 2020)

AZ-203(retiring August 31, 2020)

AZ-300(retiring August 31, 2020)

AZ-301(retiring August 31, 2020)

77-419(retiring June 30, 2020)

70-333(retiring January 31, 2021)

70-334(retiring January 31, 2021)

70-339(retiring January 31, 2021)

70-345(retiring January 31, 2021)

70-357(retiring January 31, 2021)

70-410(retiring January 31, 2021)

70-411(retiring January 31, 2021)

70-412(retiring January 31, 2021)

70-413(retiring January 31, 2021)

70-414(retiring January 31, 2021)

70-417(retiring January 31, 2021)

70-461(retiring January 31, 2021)

70-462(retiring January 31, 2021)

70-463(retiring January 31, 2021)

70-464(retiring January 31, 2021)

70-465(retiring January 31, 2021)

70-466(retiring January 31, 2021)

70-467(retiring January 31, 2021)

70-480(retiring January 31, 2021)

70-483(retiring January 31, 2021)

70-486(retiring January 31, 2021)

70-487(retiring January 31, 2021)

70-537(retiring January 31, 2021)

70-705(retiring January 31, 2021)

70-740(retiring January 31, 2021)

70-741(retiring January 31, 2021)

70-742(retiring January 31, 2021)

70-743(retiring January 31, 2021)

70-744(retiring January 31, 2021)

70-745(retiring January 31, 2021)

70-761(retiring January 31, 2021)

70-762(retiring January 31, 2021)

70-764(retiring January 31, 2021)

70-765(retiring January 31, 2021)

70-767(retiring January 31, 2021)

70-768(retiring January 31, 2021)

70-777(retiring January 31, 2021)

70-778(retiring January 31, 2021)

70-779(retiring January 31, 2021)

MB2-716(retiring January 31, 2021)

MB6-894(retiring January 31, 2021)

MB6-897(retiring January 31, 2021)

MB6-898(retiring January 31, 2021)