Saturday, 28 October 2017
Thursday, 27 April 2017
Friday, 24 February 2017
CompTIA SY0-401 Exam Dumps Sample Questions
SY0-401 Question 36:
Which of the following, if properly implemented, would prevent users from accessing files that are unrelated to their job duties? (Select TWO).
A. Separation of duties
B. Job rotation
C. Mandatory vacation
D. Time of day restrictions
E. Least privilege
Correct Answer: A, E
Which of the following, if properly implemented, would prevent users from accessing files that are unrelated to their job duties? (Select TWO).
A. Separation of duties
B. Job rotation
C. Mandatory vacation
D. Time of day restrictions
E. Least privilege
Correct Answer: A, E
Tuesday, 7 February 2017
SY0-401 Exam Exact Questions & Answers
SY0-401 Question 35:
A computer is found to be infected with malware and a technician re-installs the operating system. The computer remains infected with malware. This is an example of:
A. a rootkit.
B. a MBR infection.
C. an exploit kit.
D. Spyware.
Correct Answer: B
A computer is found to be infected with malware and a technician re-installs the operating system. The computer remains infected with malware. This is an example of:
A. a rootkit.
B. a MBR infection.
C. an exploit kit.
D. Spyware.
Correct Answer: B
Saturday, 21 January 2017
Free CompTIA SY0-401 Exam Practice Questions
Free Sample Question 34:
An organization processes credit card transactions and is concerned that an employee may intentionally email credit card numbers to external email addresses.
This company should consider which of the following technologies?
A. IDS
B. Firewalls
C. DLP
D. IPS
Correct Answer: C
An organization processes credit card transactions and is concerned that an employee may intentionally email credit card numbers to external email addresses.
This company should consider which of the following technologies?
A. IDS
B. Firewalls
C. DLP
D. IPS
Correct Answer: C
Wednesday, 14 December 2016
Verified SY0-401 Exam Questions & Answers
QUESTION 33
Which of the following types of technologies is used by security and research personnel for identification and analysis of new security threats in a networked environment by using false data/hosts for information collection?
A. Honeynet
B. Vulnerability scanner
C. Port scanner
D. Protocol analyzer
Correct Answer: A
Which of the following types of technologies is used by security and research personnel for identification and analysis of new security threats in a networked environment by using false data/hosts for information collection?
A. Honeynet
B. Vulnerability scanner
C. Port scanner
D. Protocol analyzer
Correct Answer: A
Monday, 28 November 2016
New & Updated SY0-401 CompTIA Exam Dumps
QUESTION 32
Which of the following attacks impact the availability of a system? (Select TWO).
A. Smurf
B. Phishing
C. Spim
D. DDoS
E. Spoofing
Correct Answer: A, D
Which of the following attacks impact the availability of a system? (Select TWO).
A. Smurf
B. Phishing
C. Spim
D. DDoS
E. Spoofing
Correct Answer: A, D
Subscribe to:
Posts (Atom)







