Comptia SY0-301 Q & A / Study Guide


 

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


 

QUESTION 1
Actively monitoring data streams in search of malicious code or behavior is an example of:

A. load balancing.
B. an Internet proxy.
C. URL filtering.
D. content inspection.

Answer: D

Explanation:


QUESTION 2
Which of the following network devices would MOST likely be used to detect but not react to
suspicious behavior on the network?

A. Firewall
B. NIDS
C. NIPS
D. HIDS

Answer: B

Explanation:


QUESTION 3
The security administrator is getting reports from users that they are accessing certain websites
and are unable to download anything off of those sites. The security administrator is also receiving
several alarms from the IDS about suspicious traffic on the network. Which of the following is the
MOST likely cause?

A. NIPS is blocking activities from those specific websites.
B. NIDS is blocking activities from those specific websites.
C. The firewall is blocking web activity.
D. The router is denying all traffic from those sites.

Answer: A

Explanation:


QUESTION 4
Which of the following tools provides the ability to determine if an application is transmitting a
password in clear-text?

A. Protocol analyzer
B. Port scanner
C. Vulnerability scanner
D. Honeypot

Answer: A

Explanation:


QUESTION 5
Which of the following can a security administrator implement to help identify smurf attacks?

A. Load balancer
B. Spam filters
C. NIDS
D. Firewall

Answer: C

Explanation:


QUESTION 6
Which of the following wireless security controls can be easily and quickly circumvented using only
a network sniffer? (Select TWO).

A. MAC filtering
B. Disabled SSID broadcast
C. WPA2-Enterprise
D. EAP-TLS
E. WEP with 802.1x

Answer: A,B

Explanation:


QUESTION 7
Which of the following functions is MOST likely performed by a web security gateway?

A. Protocol analyzer
B. Content filtering
C. Spam filtering
D. Flood guard

Answer: B

Explanation:


QUESTION 8
Which of the following devices is often used to cache and filter content?

A. Proxies
B. Firewall
C. VPN
D. Load balancer

Answer: A

Explanation:


QUESTION 9
In order to provide flexible working conditions, a company has decided to allow some employees
remote access into corporate headquarters. Which of the following security technologies could be
used to provide remote access? (Select TWO).

A. Subnetting
B. NAT
C. Firewall
D. NAC
E. VPN

Answer: C,E

Explanation:


QUESTION 10
Which of the following devices is used to optimize and distribute data workloads across multiple
computers or networks?

A. Load balancer
B. URL filter
C. VPN concentrator
D. Protocol analyzer

Answer: A

Explanation:

 

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]

Comments |0|

Legend *) Required fields are marked
**) You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>