This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Fri Nov 22 0:26:44 2024 / +0000 GMT ___________________________________________________ Title: [Braindump2go]CompTIA SY0-401 VCE & SY0-401 PDF 1867q(August 2016)New Updated[NQ61-NQ70] --------------------------------------------------- 2016/08 SY0-401: CompTIA Security+ Certification Exam Questions New Updated Today! Free Instant Download SY0-401 Exam Dumps(PDF & VCE) 1867Q&As from Braindump2go.com!100% Real Exam Questions!     100% Exam Pass Guaranteed! NEW QUESTION 61 - NEW QUESTION 70: 1.|2016/08 SY0-401 Exam Dumps(PDF & VCE) 1867Q&As Download:http://www.braindump2go.com/sy0-401.html 2.|2016/08 SY0-401 Exam Questions & Answers:https://drive.google.com/folderview?id=0B75b5xYLjSSNTldvc1ZkQlNUc0k&usp=sharing QUESTION 61Which of the following technologies can store multi-tenant data with different security requirements? A.    Data loss preventionB.    Trusted platform moduleC.    Hard drive encryptionD.    Cloud computing Answer: DExplanation:One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This "multitenant" nature means that workloads from different clients can be on the same system, and a flaw in implementation could compromise security. QUESTION 62Multi-tenancy is a concept found in which of the following? A.    Full disk encryptionB.    Removable mediaC.    Cloud computingD.    Data loss prevention Answer: CExplanation:One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This "multitenant" nature means that workloads from different clients can be on the same system, and a flaw in implementation could compromise security. QUESTION 63Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks? A.    Protocol filterB.    Load balancerC.    NIDSD.    Layer 7 firewall Answer: DExplanation:An application-level gateway firewall filters traffic based on user access, group membership, the application or service used, or even the type of resources being transmitted. This type of firewall operates at the Application layer (Layer 7) of the OSI model. QUESTION 64Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of: A.    Redundant systems.B.    Separation of duties.C.    Layered security.D.    Application control. Answer: CExplanation:Layered security is the practice of combining multiple mitigating security controls to protect resources and data. QUESTION 65A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure? A.    IPsecB.    SFTPC.    BGPD.    PPTP Answer: AExplanation:Layer 2 Tunneling Protocol (L2TP) came about through a partnership between Cisco and Microsoft with the intention of providing a more secure VPN protocol. L2TP is considered to be a more secure option than PPTP, as the IPSec protocol which holds more secure encryption algorithms, is utilized in conjunction with it. It also requires a pre-shared certificate or key. L2TP's strongest level of encryption makes use of 168 bit keys, 3 DES encryption algorithm and requires two levels of authentication.L2TP has a number of advantages in comparison to PPTP in terms of providing data integrity and authentication of origin verification designed to keep hackers from compromising the system. However, the increased overhead required to manage this elevated security means that it performs at a slower pace than PPTP. QUESTION 66Pete, a network administrator, is implementing IPv6 in the DMZ. Which of the following protocols must he allow through the firewall to ensure the web servers can be reached via IPv6 from an IPv6 enabled Internet host? A.    TCP port 443 and IP protocol 46B.    TCP port 80 and TCP port 443C.    TCP port 80 and ICMPD.    TCP port 443 and SNMP Answer: BExplanation:HTTP and HTTPS, which uses TCP port 80 and TCP port 443 respectively, is necessary for Communicating with Web servers. It should therefore be allowed through the firewall. QUESTION 67Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow incoming SFTP connections? A.    21/UDPB.    21/TCPC.    22/UDPD.    22/TCP Answer: DExplanation:SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22. QUESTION 68A network administrator is asked to send a large file containing PII to a business associate.Which of the following protocols is the BEST choice to use? A.    SSHB.    SFTPC.    SMTPD.    FTP Answer: BExplanation:SFTP encrypts authentication and data traffic between the client and server by making use of SSH to provide secure FTP communications. As a result, SFTP offers protection for both the authentication traffic and the data transfer taking place between a client and server. QUESTION 69Which of the following is a difference between TFTP and FTP? A.    TFTP is slower than FTP.B.    TFTP is more secure than FTP.C.    TFTP utilizes TCP and FTP uses UDP.D.    TFTP utilizes UDP and FTP uses TCP. Answer: DExplanation:FTP employs TCP ports 20 and 21 to establish and maintain client-to-server communications, whereas TFTP makes use of UDP port 69. QUESTION 70Which of the following is the default port for TFTP? A.    20B.    69C.    21D.    68 Answer: BExplanation:TFTP makes use of UDP port 69. !!!RECOMMEND!!! 1.|2016/08 SY0-401 PDF Dumps & VCE Dumps 1867Q&As Download: http://www.braindump2go.com/sy0-401.html   2.|2016/08 SY0-401 Questions & Answers:  https://drive.google.com/folderview?id=0B75b5xYLjSSNTldvc1ZkQlNUc0k&usp=sharing --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2016-08-31 03:38:02 Post date GMT: 2016-08-31 03:38:02 Post modified date: 2016-08-31 03:38:02 Post modified date GMT: 2016-08-31 03:38:02 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com