Free Download Latest 2014 Pass4sure&Lead2pass CompTIA SY0-401 Dumps (31-40)

An administrator discovers that many users have used their same passwords for years even though the network requires that the passwords be changed every six weeks. Which of the following, when used together, would BEST prevent users from reusing their existing password? (Select TWO).

A.    Length of password
B.    Password history
C.    Minimum password age
D.    Password expiration
E.    Password complexity
F.    Non-dictionary words

Answer: BC

A recent audit has discovered that at the time of password expiration clients are able to recycle the previous credentials for authentication. Which of the following controls should be used together to prevent this from occurring? (Select TWO).

A.    Password age
B.    Password hashing
C.    Password complexity
D.    Password history
E.    Password length

Answer: AD

A system administrator is configuring UNIX accounts to authenticate against an external server. The configuration file asks for the following information DC=ServerName and DC=COM. Which of the following authentication services is being used?

B.    SAML
D.    LDAP

Answer: D

In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following?

A.    Identification
B.    Authorization
C.    Authentication
D.    Multifactor authentication

Answer: C

Which of the following network design elements allows for many internal devices to share one public IP address?

A.    DNAT
B.    PAT
C.    DNS
D.    DMZ

Answer: B

Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?

A.    Spam filter
B.    URL filter
C.    Content inspection
D.    Malware inspection

Answer: B

When considering a vendor-specific vulnerability in critical industrial control systems which of the following techniques supports availability?

A.    Deploying identical application firewalls at the border
B.    Incorporating diversity into redundant design
C.    Enforcing application white lists on the support workstations
D.    Ensuring the systems’ anti-virus definitions are up-to-date

Answer: B

During the information gathering stage of a deploying role-based access control model, which of the following information is MOST likely required?

A.    Conditional rules under which certain systems may be accessed
B.    Matrix of job titles with required access privileges
C.    Clearance levels of all company personnel
D.    Normal hours of business operation

Answer: B

The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future?

A.    Job rotation
B.    Separation of duties
C.    Mandatory Vacations
D.    Least Privilege

Answer: B

Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information. Which of the following will accomplish this task securely?

A.    Digital Signatures
B.    Hashing
C.    Secret Key
D.    Encryption

Answer: D

If you want to pass CompTIA SY0-401 successfully, donot missing to read latest lead2pass CompTIA SY0-401 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.