Free Download Latest 2014 Pass4sure&Lead2pass CompTIA SY0-401 Dumps (61-70)

An administrator wants to establish a WiFi network using a high gain directional antenna with a narrow radiation pattern to connect two buildings separated by a very long distance. Which of the following antennas would be BEST for this situation?

A.    Dipole
B.    Yagi
C.    Sector
D.    Omni

Answer: B

An attacker used an undocumented and unknown application exploit to gain access to a file server. Which of the following BEST describes this type of attack?

A.    Integer overflow
B.    Cross-site scripting
C.    Zero-day
D.    Session hijacking
E.    XML injection

Answer: C

Which of the following is an XML based open standard used in the exchange of authentication and authorization information between different parties?

A.    LDAP
B.    SAML
D.    Kerberos

Answer: B

Which of the following ports and protocol types must be opened on a host with a host- based firewall to allow incoming SFTP connections?

A.    21/UDP
B.    21/TCP
C.    22/UDP
D.    22/TCP

Answer: D

A user, Ann, is reporting to the company IT support group that her workstation screen is blank other than a window with a message requesting payment or else her hard drive will be formatted. Which of the following types of malware is on Ann’s workstation?

A.    Trojan
B.    Spyware
C.    Adware
D.    Ransomware

Answer: D

Which of the following controls can be implemented together to prevent data loss in the event of theft of a mobile device storing sensitive information? (Select TWO).

A.    Full device encryption
B.    Screen locks
C.    GPS
D.    Asset tracking
E.    Inventory control

Answer: AB

A way to assure data at-rest is secure even in the event of loss or theft is to usE.

A.    full device encryption.
B.    special permissions on the file system.
C.    Trusted Platform Module integration.
D.    Access Control Lists.

Answer: A

A security audit identifies a number of large email messages being sent by a specific user from their company email account to another address external to the company. These messages were sent prior to a company data breach, which prompted the security audit. The user was one of a few people who had access to the leaked data. Review of the suspect’s emails show they consist mostly of pictures of the user at various locations during a recent vacation. No suspicious activities from other users who have access to the data were discovered.
Which of the following is occurring?

A.    The user is encrypting the data in the outgoing messages.
B.    The user is using steganography.
C.    The user is spamming to obfuscate the activity.
D.    The user is using hashing to embed data in the emails.

Answer: B

A security analyst is reviewing firewall logs while investigating a compromised web server.
The following ports appear in the log.
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?

A.    LDAP
B.    HTTP
C.    RDP

Answer: C

An organization does not want the wireless network name to be easily discovered. Which of the following software features should be configured on the access points?

A.    SSID broadcast
B.    MAC filter
C.    WPA2
D.    Antenna placement

Answer: A

If you want to pass CompTIA SY0-401 successfully, donot missing to read latest lead2pass CompTIA SY0-401 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.