CompTIA SY0-201 Real Exam Questions

CompTIA Security+ is an international, vendor-neutral certification that proves competency in system security, network infrastructure, access control and organizational security. Major organizations that employ CompTIA Security+ certified staff include Booz Allen Hamilton, Hewlett-Packard, IBM, Motorola, Symantec, Telstra, Hitachi, Ricoh, Lockheed Martin, Unisys, Hilton Hotels Corp., General Mills, the U.S. Navy, Army, Air Force and Marines.

1. Which of the following should a technician recommend to prevent physical access to individual office areas? (Select TWO).
A. Video surveillance
B. Blockade
C. Key card readers
D. Mantrap
E. Perimeter fence
Answer: CD

2. Which of the following could BEST assist in the recovery of a crashed hard drive?
A. Forensics software
B. Drive optimization
C. Drive sanitization
D. Damage and loss control
Answer: A

3. Which of the following type of attacks is TCP/IP hijacking?
A. Birthday
B. ARP poisoning
C. MAC flooding
D. Man-in-the-middle
Answer: D

4. Snort, TCPDump and Wireshark are commonly used for which of the following?
A. Port scanning
B. Host monitoring
C. DDoS attacks
D. Network sniffing
Answer: D

5. An instance where a biometric system identifies users that are authorized and allows them access is called which of the following?
A. False negative
B. True negative
C. False positive
D. True positive
Answer: D

6. Which of the following can be used to encrypt FTP or telnet credentials over the wire?
Answer: A

7. Which of the following is a reason that NAT would be implemented?
A. Subnetting
B. Address hiding
C. VLAN management
D. Network access control
Answer: B

8. While reviewing the firewall logs an administrator notices a number of unauthorized attempted connections from 10.x.x.x on an unused port. Which of the following is the correct procedure to follow when mitigating this risk?
A. Block the domain range *.cn
B. Block the IP range 10.x.x.x/32
C. Block all traffic on that specific port
D. Block IP 10.x.x.x
Answer: C

9. Which of the following demonstrates the process of ensuring that both ends of the connection are in fact who they say they are?
A. Integrity
B. Identification
C. Authentication
D. Non-repudiation
Answer: D

10. Which of the following logical access controls would be MOST appropriate to use when creating an account for a temporary worker?
B. Account expiration
C. Time of day restrictions
D. Logical tokens
Answer: B

Download  |  Password: