SY0-201 Q & A / Study Guide

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which of the following logical access control methods would a security administrator need to
modify in order to control network traffic passing through a router to a different network?

A. Configuring VLAN 1
B. ACL
C. Logical tokens
D. Role-based access control changes

Answer: B


QUESTION 2
Which of the following tools limits external access to the network?

A. IDS
B. VLAN
C. Firewall
D. DMZ

Answer: C


QUESTION 3
Which of the following tools was created for the primary purpose of reporting the services that are
open for connection on a networked workstation?

A. Protocol analyzer
B. Port scanner
C. Password crackers
D. Vulnerability scanner

Answer: B


QUESTION 4
Which of the following is MOST likely to be an issue when turning on all auditing functions within a
system?

A. Flooding the network with all of the log information
B. Lack of support for standardized log review tools
C. Too much information to review
D. Too many available log aggregation tools

Answer: C


QUESTION 5
Upon opening the browser, a guest user is redirected to the company portal and asked to agree to
the acceptable use policy. Which of the following is MOST likely causing this to appear?

A. NAT
B. NAC
C. VLAN
D. DMZ

Answer: B


QUESTION 6
USB devices with a virus delivery mechanism are an example of which of the following security
threats?

A. Adware
B. Trojan
C. Botnets
D. Logic bombs

Answer: B


QUESTION 7
Cell phones with network access and the ability to store data files are susceptible to which of the
following risks?

A. Input validation errors
B. SMTP open relays
C. Viruses
D. Logic bombs

Answer: C


QUESTION 8
When establishing a connection between two IP based routers, which of the following protocols is
the MOST secure?

A. TFTP
B. HTTPS
C. FTP
D. SSH

Answer: D


QUESTION 9
Which of the following algorithms provides better protection against brute force attacks by using a
160-bit message digest?

A. MD5
B. SHA-1
C. LANMAN
D. NTLM

Answer: B


QUESTION 10
Which of the following access control technologies provides a rolling password for one-time use?

A. RSA tokens
B. ACL
C. Multifactor authentication
D. PIV card

Answer: A

 

 

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]

Comments |0|

Legend *) Required fields are marked
**) You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>