最新的SY0-201题库下载!
考试号:SY0-201
认证名称:CompTIA Security+(2008 Edition) Exam
版本号:V8.02
考题数量:469道
更新日期:2010-5-15
A. Identification tells who the user is and authentication tells whether the user is allowed to logon to a system.
B. Identification tells who the user is and authentication proves it.
C. Identification proves who the user is and authentication is used to keep the users data secure.
D. Identification proves who the user is and authentication tells the user what they are allowed to do.
Answer: B
22. An administrator wishes to deploy an IPSec VPN connection between two routers across a WAN.
The administrator wants to ensure that the VPN is encrypted in the most secure fashion possible. Which of the following BEST identifies the correct IPSec mode and the proper configuration?
A. IPSec in tunnel mode, using both the ESP and AH protocols
B. IPSec in tunnel mode, using the ESP protocol
C. IPSec in transport mode, using the AH protocol
D. IPSec in transport mode, using both ESP and AH protocols
Answer: A
23. Performance baselines are used to:
A. record which users type their passwords incorrectly.
B. demonstrate a man-in-the-middle attack.
C. indicate anomaly-based network attacks.
D. indicate the current presence of malicious code.
Answer: D
24. Which of the following is a reason that NAT would be implemented?
A. Subnetting
B. Address hiding
C. VLAN management
D. Network access control
Answer: B
25. While reviewing the firewall logs an administrator notices a number of unauthorized attempted connections from 10.x.x.x on an unused port. Which of the following is the correct procedure to follow
when mitigating this risk?
A. Block the domain range *.cn
B. Block the IP range 10.x.x.x/32
C. Block all traffic on that specific port
D. Block IP 10.x.x.x
Answer: C
26. Which of the following demonstrates the process of ensuring that both ends of the connection are in fact who they say they are?
A. Integrity
B. Identification
C. Authentication
D. Non-repudiation
Answer: D
27. Which of the following is commonly used in a distributed denial of service (DDoS) attack?
A. Phishing
B. Adware
C. Botnet
D. Trojan
Answer: C
可登录killtest题库网下载更多的题库!
◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。