Free Sharing Lead2pass Exam Dumps

Free Download All The Latest Cisco, Microsoft, CompTIA, Oracle, VCP, CISSP Questions And Answers

Free Online Latest 2014 Pass4sure&Lead2pass CompTIA SY0-301 Dumps (51-60)

QUESTION 51
Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT

A.    Buffer overflow prevention
B.    Input validation
C.    CSRF prevention
D.    Cross-site scripting prevention

Answer: B

QUESTION 52
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?

A.    RADIUS
B.    TACACS+
C.    Kerberos
D.    LDAP

Answer: B

QUESTION 53
Which of the following can use RC4 for encryption? (Select TWO).

A.    CHAP
B.    SSL
C.    WEP
D.    AES
E.    3DES

Answer: BC

QUESTION 54
Which of the following defines a business goal for system restoration and acceptable data loss?

A.    MTTR
B.    MTBF
C.    RPO
D.    Warm site

Answer: C

QUESTION 55
If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing?

A.    Transitive trust
B.    Public key trust
C.    Certificate authority trust
D.    Domain level trust

Answer: A

QUESTION 56
Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?

A.    Business continuity planning
B.    Continuity of operations
C.    Business impact analysis
D.    Succession planning

Answer: D

QUESTION 57
Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?

A.    Recovery agent
B.    Certificate authority
C.    Trust model
D.    Key escrow

Answer: A

QUESTION 58
Which of the following devices will help prevent a laptop from being removed from a certain location?

A.    Device encryption
B.    Cable locks
C.    GPS tracking
D.    Remote data wipes

Answer: B

QUESTION 59
Which of the following is the MOST secure protocol to transfer files?

A.    FTP
B.    FTPS
C.    SSH
D.    TELNET

Answer: B

QUESTION 60
Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms?

A.    Signature based IPS
B.    Signature based IDS
C.    Application based IPS
D.    Anomaly based IDS

Answer: D

If you want to pass CompTIA SY0-301 successfully, donot missing to read latest lead2pass CompTIA SY0-301 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/SY0-301.html

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back