Exam Question demo:
QUESTION: 5
Given: John is a network administrator. He advises the server administrator of his company
to implement whitelisting, blacklisting, closing-open relays and strong authentication
techniques. Which threat is being addressed?
A. Viruses
B. Adware
C. Spam
D. Spyware
Answer: C
QUESTION: 6
Most current encryption schemes are based on:
A. digital rights management
B. time stamps
C. randomizing
D. algorithms
Answer: D
QUESTION: 7
Study the following items carefully, which one will permit a user to float a domain
registration for a maximum of five days?
A. Spoofing
B. DNS poisoning
C. Domain hijacking
D. Kiting
Answer: D
QUESTION: 9
The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and
procedures needed to create, manage, store, distribute, and revoke digital certificates. The
public key infrastructure is based on which encryption schemes?
A. Symmetric
B. Quantum
C. Asymmetric
D. Elliptical curve
Answer: C
QUESTION: 10
How is access control permissions established in the RBAC access control model?
A. The system administrator.
B. The owner of the resource.
C. The role or responsibilities users have in the organization.
D. None of the above.
Answer: C
QUESTION: 12
What does the DAC access control model use to identify the users who have permissions to
a resource?
A. Predefined access privileges.
B. The role or responsibilities users have in the organization
C. Access Control Lists
D. None of the above.
Answer: C
QUESTION: 13
Alexander works as a network administrator for an organization which has 33,000 users.
Now, Alexander wants to store six months of Internet proxy logs on a dedicated logging
server for analysis and content reporting. The reports are not time critical, but are required
by upper management for legal obligations. When determining the requirements for the
l oggi ng ser ver, whi ch of t he foll owi ng will not be appli ed?
A. log storage and backup requirements.
B. log details and level of verbose logging.
C. performance baseline and audit trails.
D. time stamping and integrity of the logs.
Answer: C
-
PassGuide SY0-201 Exam Questions, Comptia SY0-201 Practice …
www.passguide.com › Comptia › Security+ – CachedContains 3 essential products needed for your study. SY0-201 Questions & Answers 887 Questions Last Update : Oct 07, 2012. SY0-201 Study Guide 127 PDF …
-
Emmett Dulaney. Comptia security+ study guide: exam sy0-201
www.fmh.utl.pt/calendar/ebooks_view.php?lib=833 – CachedStart with 12-16 pieces of silver. download comptia security+ study guide: exam sy0-201 pdf the Pass Line bet on Liverpool and Manchester United, and the face …
-
Pass4sure SY0-201 Exam Questions, CompTIA SY0-201 Practice …
www.pass4sure.com › … › Frequently Asked Questions – CachedSY0-201 Practical Labs 10 Labs – Last Update : Oct 28, 2012, $54.99 $49.99. SY0-201 Study Guide 133 PDF pages – Last Update : Sep 23, 2012, $32.99 …
-
Best Comptia SY0-201 Exam Training – Latest Security+ SY0-201 …
www.visualexams.com/SY0-201.htm – CachedSY0-201 Questions & Answers 887 Questions – Last Update : Oct 09, 2012, $87.99 $79.99. SY0-201 Study Guide 127 PDF pages – Last Update : Oct 28, 2012 …