Free Sharing Lead2pass Exam Dumps

Free Download All The Latest Cisco, Microsoft, CompTIA, Oracle, VCP, CISSP Questions And Answers

Free Online Latest 2014 Pass4sure&Lead2pass CompTIA SY0-301 Dumps (1-10)

QUESTION 1
Which of the following devices is BEST suited for servers that need to store private keys?

A.    Hardware security module
B.    Hardened network firewall
C.    Solid state disk drive
D.    Hardened host firewall

Answer: A

QUESTION 2
All of the following are valid cryptographic hash functions EXCEPT:

A.    RIPEMD
B.    RC4.
C.    SHA-512.
D.    MD4.

Answer: B

QUESTION 3
In regards to secure coding practices, why is input validation important?

A.    It mitigates buffer overflow attacks.
B.    It makes the code more readable.
C.    It provides an application configuration baseline.
D.    It meets gray box testing standards.

Answer: A

QUESTION 4
Which of the following would be used when a higher level of security is desired for encryption key storage?

A.    TACACS+
B.    L2TP
C.    LDAP
D.    TPM

Answer: D

QUESTION 5
A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?

A.    Firewall
B.    Application
C.    IDS
D.    Security

Answer: D

QUESTION 6
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?

A.    Registration
B.    CA
C.    CRL
D.    Recovery agent

Answer: C

QUESTION 7
Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?

A.    Smartcard
B.    Token
C.    Discretionary access control
D.    Mandatory access control

Answer: A

QUESTION 8
Which of the following devices would MOST likely have a DMZ interface?

A.    Firewall
B.    Switch
C.    Load balancer
D.    Proxy

Answer: A

QUESTION 9
Which of the following application security testing techniques is implemented when an automated system generates random input data?

A.    Fuzzing
B.    XSRF
C.    Hardening
D.    Input validation

Answer: A

QUESTION 10
Which of the following can be used by a security administrator to successfully recover a user’s forgotten password on a password protected file?

A.    Cognitive password
B.    Password sniffing
C.    Brute force
D.    Social engineering

Answer: C

If you want to pass CompTIA SY0-301 successfully, donot missing to read latest lead2pass CompTIA SY0-301 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/SY0-301.html

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back