This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection
[
https://www.mcitpdump.com
]
Export date: Fri Mar 29 12:30:37 2024 / +0000 GMT
2016/08 SY0-401: CompTIA Security+ Certification Exam Questions New Updated Today! Free Instant Download SY0-401 Exam Dumps(PDF & VCE) 1867Q&As from Braindump2go.com! NEW QUESTION 61 - NEW QUESTION 70: 1.|2016/08 SY0-401 Exam Dumps(PDF & VCE) 1867Q&As Download:http://www.braindump2go.com/sy0-401.html 2.|2016/08 SY0-401 Exam Questions & Answers:https://drive.google.com/folderview?id=0B75b5xYLjSSNTldvc1ZkQlNUc0k&usp=sharing QUESTION 61 A. Data loss prevention Answer: D QUESTION 62 A. Full disk encryption Answer: C QUESTION 63 A. Protocol filter Answer: D QUESTION 64 A. Redundant systems. Answer: C QUESTION 65 A. IPsec Answer: A QUESTION 66 A. TCP port 443 and IP protocol 46 Answer: B QUESTION 67 A. 21/UDP Answer: D QUESTION 68 A. SSH Answer: B QUESTION 69 A. TFTP is slower than FTP. Answer: D QUESTION 70 A. 20 Answer: B 1.|2016/08 SY0-401 PDF Dumps & VCE Dumps 1867Q&As Download: http://www.braindump2go.com/sy0-401.html 2.|2016/08 SY0-401 Questions & Answers: https://drive.google.com/folderview?id=0B75b5xYLjSSNTldvc1ZkQlNUc0k&usp=sharing
100% Real Exam Questions! 100% Exam Pass Guaranteed!
Which of the following technologies can store multi-tenant data with different security requirements?
B. Trusted platform module
C. Hard drive encryption
D. Cloud computing
Explanation:
One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This "multitenant" nature means that workloads from different clients can be on the same system, and a flaw in implementation could compromise security.
Multi-tenancy is a concept found in which of the following?
B. Removable media
C. Cloud computing
D. Data loss prevention
Explanation:
One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This "multitenant" nature means that workloads from different clients can be on the same system, and a flaw in implementation could compromise security.
Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?
B. Load balancer
C. NIDS
D. Layer 7 firewall
Explanation:
An application-level gateway firewall filters traffic based on user access, group membership, the application or service used, or even the type of resources being transmitted.
This type of firewall operates at the Application layer (Layer 7) of the OSI model.
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:
B. Separation of duties.
C. Layered security.
D. Application control.
Explanation:
Layered security is the practice of combining multiple mitigating security controls to protect resources and data.
A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?
B. SFTP
C. BGP
D. PPTP
Explanation:
Layer 2 Tunneling Protocol (L2TP) came about through a partnership between Cisco and Microsoft with the intention of providing a more secure VPN protocol. L2TP is considered to be a more secure option than PPTP, as the IPSec protocol which holds more secure encryption algorithms, is utilized in conjunction with it. It also requires a pre-shared certificate or key. L2TP's strongest level of encryption makes use of 168 bit keys, 3 DES encryption algorithm and requires two levels of authentication.
L2TP has a number of advantages in comparison to PPTP in terms of providing data integrity and authentication of origin verification designed to keep hackers from compromising the system. However, the increased overhead required to manage this elevated security means that it performs at a slower pace than PPTP.
Pete, a network administrator, is implementing IPv6 in the DMZ. Which of the following protocols must he allow through the firewall to ensure the web servers can be reached via IPv6 from an IPv6 enabled Internet host?
B. TCP port 80 and TCP port 443
C. TCP port 80 and ICMP
D. TCP port 443 and SNMP
Explanation:
HTTP and HTTPS, which uses TCP port 80 and TCP port 443 respectively, is necessary for Communicating with Web servers. It should therefore be allowed through the firewall.
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow incoming SFTP connections?
B. 21/TCP
C. 22/UDP
D. 22/TCP
Explanation:
SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22.
A network administrator is asked to send a large file containing PII to a business associate.
Which of the following protocols is the BEST choice to use?
B. SFTP
C. SMTP
D. FTP
Explanation:
SFTP encrypts authentication and data traffic between the client and server by making use of SSH to provide secure FTP communications. As a result, SFTP offers protection for both the authentication traffic and the data transfer taking place between a client and server.
Which of the following is a difference between TFTP and FTP?
B. TFTP is more secure than FTP.
C. TFTP utilizes TCP and FTP uses UDP.
D. TFTP utilizes UDP and FTP uses TCP.
Explanation:
FTP employs TCP ports 20 and 21 to establish and maintain client-to-server communications, whereas TFTP makes use of UDP port 69.
Which of the following is the default port for TFTP?
B. 69
C. 21
D. 68
Explanation:
TFTP makes use of UDP port 69.
!!!RECOMMEND!!!
Post date: 2016-08-31 03:38:02
Post date GMT: 2016-08-31 03:38:02
Post modified date: 2016-08-31 03:38:02
Post modified date GMT: 2016-08-31 03:38:02
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com