The sy0-201 updated

The sy0-201 updated at Test4actual! If you bought this exam , plz email to us !

Exam Number/Code : SY0-201
Exam Name : CompTIA Security+(2008 Edition) Exam

 

sy0-201 DEMO:

1.
An administrator is explaining the conditions under which penetration testing is preferred over vulnerability testing. Which of the following statements correctly describes these advantages?

 A.   Identifies surface vulnerabilities and can be run on a regular basis

 B.   Proves that the system can be compromised

 C.   Safe for even inexperienced testers to conduct

 D.   Can be fairly fast depending on number of hosts

Answer:B

2.

Which of the following is a public key cryptosystem?

 A.   RSA

 B.   SHA-1

 C.   3DES

 D.   MD5

Answer:A

3.

A technician visits a customer site which prohibits portable data storage devices. Which of the following items would be prohibited? (Select TWO).

 A.   USB Memory key

 B.   Bluetooth-enabled cellular phones

 C.   Wireless network detectors

 D.   Key card

 E.   Items containing RFID chips

Answer:AB

4.

A user wants to edit a file that they currently have read-only rights to; however, they are unable to provide a business justification, so the request is denied. This is the principle of:

 A.   separation of duties.

 B.   job-based access control.

 C.   least privilege.

 D.   remote access policy.

Answer:C

5.

Conducting periodic user rights audits can help an administrator identify:

 A.   new user accounts that have been created.

 B.   users who are concurrently logged in under different accounts.

 C.   unauthorized network services.

 D.   users who can view confidential information.

Answer:D

6.

Which of the following malicious programs compromises system security by exploiting system access through a virtual backdoor?

 A.   Virus

 B.   Trojan

 C.   Spam

 D.   Adware

Answer:B

7.

Which of the following is a malicious program that infects a host computer and has the ability to replicate itself?

 A.   Spyware

 B.   Virus

 C.   Rootkit

 D.   Spam

Answer:B

8.

When establishing a connection between two IP based routers, which of the following protocols is the MOST secure?

 A.   TFTP

 B.   HTTPS

 C.   FTP

 D.   SSH

Answer:D

9.

Which of the following security precautions needs to be implemented when securing a wireless network? (Select THREE).

 A.   Enable data encryption on all wireless transmissions using WPA2.

 B.   Enable the lowest power setting necessary to broadcast to the targeted range.

 C.   Enable the highest power setting possible to make sure the broadcast reaches the targeted range.

 D.   Enable data encryption on all wireless transmissions using WEP.

 E.   Authentication should take place using a pre-shared key (PSK) of no more than six characters.

 F.   Enable the ability to verify credentials on an authentication server.

Answer:ABF

10.

Which of the following BEST describes where L2TP is used?

 A.   VPN encryption

 B.   Authenticate users using CHAP

 C.   Default gateway encryption

 D.   Border gateway protocol encryption

Answer:A