Free Sharing Lead2pass Exam Dumps

Free Download All The Latest Cisco, Microsoft, CompTIA, Oracle, VCP, CISSP Questions And Answers

Free Online Latest 2014 Pass4sure&Lead2pass CompTIA SY0-301 Dumps (311-320)

Which of the following would a security administrator implement in order to identify a problem between two applications that are not communicating properly?

A.    Protocol analyzer
B.    Baseline report
C.    Risk assessment
D.    Vulnerability scan

Answer: A

Which of the following would a security administrator implement in order to identify change from the standard configuration on a server?

A.    Penetration test
B.    Code review
C.    Baseline review
D.    Design review

Answer: C

Which of the following tools would a security administrator use in order to identify all running services throughout an organization?

A.    Architectural review
B.    Penetration test
C.    Port scanner
D.    Design review

Answer: C

Which of the following protocols provides transport security for virtual terminal emulation?

A.    TLS
B.    SSH
C.    SCP
D.    S/MIME

Answer: B

Based on information leaked to industry websites, business management is concerned that unauthorized employees are accessing critical project information for a major, well-known new product. To identify any such users, the security administrator could:

A.    Set up a honeypot and place false project documentation on an unsecure share.
B.    Block access to the project documentation using a firewall.
C.    Increase antivirus coverage of the project servers.
D.    Apply security updates and harden the OS on all project servers.

Answer: A

A set of standardized system images with a pre-defined set of applications is used to build end-user workstations. The security administrator has scanned every workstation to create a current inventory of all applications that are installed on active workstations and is documenting which applications are out-of-date and could be exploited. The security administrator is determining the:

A.    Attack surface.
B.    Application hardening effectiveness.
C.    Application baseline.
D.    OS hardening effectiveness.

Answer: A

A perimeter survey finds that the wireless network within a facility is easily reachable outside of the physical perimeter. Which of the following should be adjusted to mitigate this risk?

A.    CCMP
B.    MAC filter
C.    SSID broadcast
D.    Power level controls

Answer: D

Which of the following would verify that a threat does exist and security controls can easily be bypassed without actively testing an application?

A.    Protocol analyzer
B.    Vulnerability scan
C.    Penetration test
D.    Port scanner

Answer: B

Connections using point-to-point protocol authenticate using which of the following? (Select TWO).

B.    PAP
C.    CHAP
D.    RC4
E.    Kerberos

Answer: BC

Which of the following will help prevent smurf attacks?

A.    Allowing necessary UDP packets in and out of the network
B.    Disabling directed broadcast on border routers
C.    Disabling unused services on the gateway firewall
D.    Flash the BIOS with the latest firmware

Answer: B

If you want to pass CompTIA SY0-301 successfully, donot missing to read latest lead2pass CompTIA SY0-301 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back