Free Sharing Lead2pass Exam Dumps

Free Download All The Latest Cisco, Microsoft, CompTIA, Oracle, VCP, CISSP Questions And Answers

Free Online Latest 2014 Pass4sure&Lead2pass CompTIA SY0-301 Dumps (291-300)

QUESTION 291
A trojan was recently discovered on a server. There are now concerns that there has been a security breach that allows unauthorized people to access data. The administrator should be looking for the presence of a/an:

A.    Logic bomb.
B.    Backdoor.
C.    Adware application.
D.    Rootkit.

Answer: B

QUESTION 292
Which of the following protocols uses TCP instead of UDP and is incompatible with all previous versions?

A.    TACACS
B.    XTACACS
C.    RADIUS
D.    TACACS+

Answer: D

QUESTION 293
Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE).

A.    RC4
B.    3DES
C.    AES
D.    MD5
E.    PGP
F.    Blowfish

Answer: BCF

QUESTION 294
Drag and Drop Questions
Drag and drop the correct protocol to its default port.

image
Answer:

image

QUESTION 295
Drag and Drop Questions
A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.

image
Answer:

image

QUESTION 296
Which of the following must be kept secret for a public key infrastructure to remain secure?

A.    Certificate Authority
B.    Certificate revocation list
C.    Public key ring
D.    Private key

Answer: D

QUESTION 297
Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?

A.    Protocol filter
B.    Load balancer
C.    NIDS
D.    Layer 7 firewall

Answer: D

QUESTION 298
Which of the following is best practice to put at the end of an ACL?

A.    Implicit deny
B.    Time of day restrictions
C.    Implicit allow
D.    SNMP string

Answer: A

QUESTION 299
An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?

A.    TCP/IP
B.    SSL
C.    SCP
D.    SSH

Answer: B

QUESTION 300
A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO’s requirements?

A.    Username and password
B.    Retina scan and fingerprint scan
C.    USB token and PIN
D.    Proximity badge and token

Answer: C

If you want to pass CompTIA SY0-301 successfully, donot missing to read latest lead2pass CompTIA SY0-301 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/SY0-301.html

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back