Free Sharing Lead2pass Exam Dumps

Free Download All The Latest Cisco, Microsoft, CompTIA, Oracle, VCP, CISSP Questions And Answers

Free Online Latest 2014 Pass4sure&Lead2pass CompTIA SY0-301 Dumps (331-340)

Which of the following protocols would be used to verify connectivity between two remote devices at the HIGHEST level of the OSI model?

A.    ICMP
B.    IPSec
C.    SCP
D.    TCP

Answer: C

Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?

A.    Protocol analyzer
B.    Load balancer
C.    VPN concentrator
D.    Web security gateway

Answer: B

Which of the following uses port 22 by default? (Select THREE).

A.    SSH
B.    SSL
C.    TLS
D.    SFTP
E.    SCP
F.    FTPS
G.    SMTP

Answer: ADE

Ann, a software developer, has installed some code to reactivate her account one week after her account has been disabled. Which of the following is this an example of? (Select TWO).

A.    Rootkit
B.    Logic Bomb
C.    Botnet
D.    Backdoor
E.    Spyware

Answer: BD

The string:
` or 1=1– –
represents which of the following?

A.    Bluejacking
B.    Rogue access point
C.    SQL Injection
D.    Client-side attacks

Answer: C

Joe, an administrator, installs a web server on the Internet that performs credit card transactions for customer payments. Joe also sets up a second web server that looks like the first web server. However, the second server contains fabricated files and folders made to look like payments were processed on this server but really were not. Which of the following is the second server?

A.    DMZ
B.    Honeynet
C.    VLAN
D.    Honeypot

Answer: D

Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?

A.    Security logs
B.    Protocol analyzer
C.    Audit logs
D.    Honeypot

Answer: D

Which of the following should Joe, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from his company?

A.    Privacy Policy
B.    Least Privilege
C.    Acceptable Use
D.    Mandatory Vacations

Answer: D

Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for multicast packets from the switches on the network. After investigation, she discovers that this is normal activity for her network. Which of the following BEST describes these results?

A.    True negatives
B.    True positives
C.    False positives
D.    False negatives

Answer: C

Joe, a security analyst, asks each employee of an organization to sign a statement saying that they understand how their activities may be monitored. Which of the following BEST describes this statement? (Select TWO).

A.    Acceptable use policy
B.    Risk acceptance policy
C.    Privacy policy
D.    Email policy
E.    Security policy

Answer: AC

If you want to pass CompTIA SY0-301 successfully, donot missing to read latest lead2pass CompTIA SY0-301 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back