Computer Science > QUESTIONS & ANSWERS > Comptia Security+ Exam with Complete Solutions (All)

Comptia Security+ Exam with Complete Solutions

Document Content and Description Below

Comptia Security+ Exam with Complete Solutions A security administrator is implementing a security program that addresses confidentiality and availability. What else should the administrator inclu... de? -Answer- Ensure systems are not susceptible to unauthorized changes You need to transmit PII via email and you wan tot maintain its confidentiality. What should you do? -Answer- Encrypt it before sending Lisa manages network devices in your organization and maintains copies of the configuration files for all the managed routers and switches. On a weekly basis, she creates hashes for these files and compares them with the hashes she created on the same files the previous week. Which security goal is she pursuing? -Answer- Integrity An organization wants to provide protection against malware attacks. Administrators have installed antivirus software on all computers. Additionally, they implemented a firewall and an IDS on the network. What identifies this principle? -Answer- Layered Security Homer called into the help desk and says he forgot his password. What should the help-desk professional do after Homer has verified his identity? -Answer- Reset the password and configure the password to expire after the first use Which type of authentication does a hardware token provide? -Answer- One-time password Which type of authentication is a retina scan? -Answer- Biometric Users are required to log on to their computers with a smart card and a PIN. Which describes this? -Answer- Multifactor authentication Your company recently began allowing workers to telecommute from home one or more days a week. However, your company doesn't currently have a remote access solution. They want to implement an AAA solution that supports different vendors. Which of the following is the BEST choice? -Answer- RADIUS Your organization has implemented a system that stores user credentials in a central database. Users log on once with their credentials. They can then access other systems in the organization without logging on again. What does this describe? -Answer- Single sign-on Your organization issues users a variety of different mobile devices. However, management wants to reduce potential data losses if the devices are lost or stolen. Which of the following is the BEST technical control to achieve this goal? -Answer- Disk encryption Your primary job activities include monitoring security logs, analyzing trend reports, and installing CCTV systems. Which of the following choices BEST identifies your responsibilities? -Answer- Detecting security incidents and implementing monitoring controls A security professional has reported an increase in the number of tailgating violations into a secure data center. What can prevent this? -Answer- Mantrap You are redesigning your password policy. You want to ensure that users change their passwords regularly, but they are unable to reuse passwords. What settings should you configure? -Answer- Maximum password age, password history, and minimum password age An outside security auditor recently completed an in-depth security audit on your network. One of the issues he reported was related to passwords. Specifically, he found the following passwords used on the network: Pa$$, 1@W2, and G7bT3. What should be changed to avoid the problem shown with these passwords? -Answer- Password length A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately one week every quarter. What is the BEST response to this situation? -Answer- Disable the accounts Your organization routinely hires contractors to assist with different projects. Administrators are rarely notified when a project ends and contractors leave. Which of the following is the BEST choice to ensure that contractors cannot log on with their account after they leave? -Answer- Enable account expiration Developers are planning to develop an application using role-based access control. Which of the following would they MOST likely include in their planning? -Answer- A matrix of functions matched with their required privileges An organization has implemented an access control model that enforces permissions based on data labels assigned at different levels. What type of model is this? -Answer- mandatory access control (MAC) Your organization's security policy requires that PII data at rest and PII data in transit be encrypted. Of the following choices? what would the organization use to achieve these objectives? -Answer- Secure Shell (SSH) and Pretty Good Privacy / GNU Privacy Guard (PGP/GPG) [Show More]

Last updated: 1 year ago

Preview 1 out of 64 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$12.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
105
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 26, 2022

Number of pages

64

Written in

Seller


seller-icon
Excel

Member since 2 years

231 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 26, 2022

Downloads

 0

Views

 105

Document Keyword Tags


$12.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·