Free Sharing Lead2pass Exam Dumps

Free Download All The Latest Cisco, Microsoft, CompTIA, Oracle, VCP, CISSP Questions And Answers

Free Online Latest 2014 Pass4sure&Lead2pass CompTIA SY0-301 Dumps (231-240)

A system administrator is responding to a legal order to turn over all logs from all company servers. The system administrator records the system time of all servers to ensure that:

A.    HDD hashes are accurate.
B.    the NTP server works properly.
C.    chain of custody is preserved.
D.    time offset can be calculated.

Answer: D

While rarely enforced, mandatory vacation policies are effective at uncovering:

A.    Help desk technicians with oversight by multiple supervisors and detailed quality control systems.
B.    Collusion between two employees who perform the same business function.
C.    Acts of incompetence by a systems engineer designing complex architectures as a member of a team.
D.    Acts of gross negligence on the part of system administrators with unfettered access to system and no oversight.

Answer: D

A company hires outside security experts to evaluate the security status of the corporate network. All of the company’s IT resources are outdated and prone to crashing. The company requests that all testing be performed in a way which minimizes the risk of system failures. Which of the following types of testing does the company want performed?

A.    Penetration testing
B.    WAF testing
C.    Vulnerability scanning
D.    White box testing

Answer: C

A security administrator notices that a specific network administrator is making unauthorized changes to the firewall every Saturday morning. Which of the following would be used to mitigate this issue so that only security administrators can make changes to the firewall?

A.    Mandatory vacations
B.    Job rotation
C.    Least privilege
D.    Time of day restrictions

Answer: C

A security administrator notices large amounts of traffic within the network heading out to an external website. The website seems to be a fake bank site with a phone number that when called, asks for sensitive information. After further investigation, the security administrator notices that a fake link was sent to several users. This is an example of which of the following attacks?

A.    Vishing
B.    Phishing
C.    Whaling
D.    SPAM
E.    SPIM

Answer: B

After a user performed a war driving attack, the network administrator noticed several similar markings where WiFi was available throughout the enterprise. Which of the following is the term used to describe these markings?

A.    IV attack
B.    War dialing
C.    Rogue access points
D.    War chalking

Answer: D

The system administrator notices that their application is no longer able to keep up with the large amounts of traffic their server is receiving daily. Several packets are dropped and sometimes the server is taken offline. Which of the following would be a possible solution to look into to ensure their application remains secure and available?

A.    Cloud computing
B.    Full disk encryption
C.    Data Loss Prevention
D.    HSM

Answer: A

After a recent internal audit, the security administrator was tasked to ensure that all credentials must be changed within 90 days, cannot be repeated, and cannot contain any dictionary words or patterns. All credentials will remain enabled regardless of the number of attempts made. Which of the following types of user account options were enforced? (Select TWO).

A.    Recovery
B.    User assigned privileges
C.    Lockout
D.    Disablement
E.    Group based privileges
F.    Password expiration
G.    Password complexity

Answer: FG

A security analyst has been notified that trade secrets are being leaked from one of the executives in the corporation. When reviewing this executive’s laptop they notice several pictures of the employee’s pets are on the hard drive and on a cloud storage network. When the analyst hashes the images on the hard drive against the hashes on the cloud network they do not match. Which of the following describes how the employee is leaking these secrets?

A.    Social engineering
B.    Steganography
C.    Hashing
D.    Digital signatures

Answer: B

During a routine audit a web server is flagged for allowing the use of weak ciphers. Which of the following should be disabled to mitigate this risk? (Select TWO).

A.    SSL 1.0
B.    RC4
C.    SSL 3.0
D.    AES
E.    DES
F.    TLS 1.0

Answer: AE

If you want to pass CompTIA SY0-301 successfully, donot missing to read latest lead2pass CompTIA SY0-301 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back