Free Download Latest 2014 Pass4sure&Lead2pass CompTIA SY0-401 Dumps (191-200)

Which of the following can be used to mitigate risk if a mobile device is lost?

A.    Cable lock
B.    Transport encryption
C.    Voice encryption
D.    Strong passwords

Answer: D

Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?

A.    Record time offset
B.    Clean desk policy
C.    Cloud computing
D.    Routine log review

Answer: B

Which of the following is an example of multifactor authentication?

A.    Credit card and PIN
B.    Username and password
C.    Password and PIN
D.    Fingerprint and retina scan

Answer: A

After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:
`Please only use letters and numbers on these fields’
Which of the following is this an example of?

A.    Proper error handling
B.    Proper input validation
C.    Improper input validation
D.    Improper error handling

Answer: B

Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE).

A.    Spam filter
B.    Load balancer
C.    Antivirus
D.    Proxies
E.    Firewall
F.    NIDS
G.    URL filtering

Answer: DEG

Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?

A.    Dumpster diving
B.    War driving
C.    Tailgating
D.    War chalking

Answer: A

Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?

A.    Application design
B.    Application security
C.    Initial baseline configuration
D.    Management of interfaces

Answer: C

Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?

A.    Acceptable Use Policy
B.    Physical security controls
C.    Technical controls
D.    Security awareness training

Answer: D

Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task?

A.    HIDS
B.    Firewall
C.    NIPS
D.    Spam filter

Answer: C

Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate?

A.    War dialing
B.    War chalking
C.    War driving
D.    Bluesnarfing

Answer: A

If you want to pass CompTIA SY0-401 successfully, donot missing to read latest lead2pass CompTIA SY0-401 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.