功能测试
首页 > Comptia认证 > 正文

最新的SY0-201题库下载!

发布-admin | 查看- | 发表时间-2010-7-5

考试号:SY0-201

认证名称:CompTIA Security+(2008 Edition) Exam

版本号:V8.02

考题数量:469

更新日期:2010-5-15

 

21. Which of the following is the difference between identification and authentication of a user?

A. Identification tells who the user is and authentication tells whether the user is allowed to logon to a system.

B. Identification tells who the user is and authentication proves it.

C. Identification proves who the user is and authentication is used to keep the users data secure.

D. Identification proves who the user is and authentication tells the user what they are allowed to do.

Answer: B

22. An administrator wishes to deploy an IPSec VPN connection between two routers across a WAN.

The administrator wants to ensure that the VPN is encrypted in the most secure fashion possible. Which of the following BEST identifies the correct IPSec mode and the proper configuration?

A. IPSec in tunnel mode, using both the ESP and AH protocols

B. IPSec in tunnel mode, using the ESP protocol

C. IPSec in transport mode, using the AH protocol

D. IPSec in transport mode, using both ESP and AH protocols

Answer: A

23. Performance baselines are used to:

A. record which users type their passwords incorrectly.

B. demonstrate a man-in-the-middle attack.

C. indicate anomaly-based network attacks.

D. indicate the current presence of malicious code.

Answer: D

24. Which of the following is a reason that NAT would be implemented?

A. Subnetting

B. Address hiding

C. VLAN management

D. Network access control

Answer: B

25. While reviewing the firewall logs an administrator notices a number of unauthorized attempted connections from 10.x.x.x on an unused port. Which of the following is the correct procedure to follow

when mitigating this risk?

A. Block the domain range *.cn

B. Block the IP range 10.x.x.x/32

C. Block all traffic on that specific port

D. Block IP 10.x.x.x

Answer: C

26. Which of the following demonstrates the process of ensuring that both ends of the connection are in fact who they say they are?

A. Integrity

B. Identification

C. Authentication

D. Non-repudiation

Answer: D

27. Which of the following is commonly used in a distributed denial of service (DDoS) attack?

A. Phishing

B. Adware

C. Botnet

D. Trojan

Answer: C

    可登录killtest题库网下载更多的题库!

或许你还对下面的文章感兴趣

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。

最新文章
最近评论
Copyright 2010 killtest.com.cn Some Rights Reserved. 浙ICP备10016241号 | DESIGN BY Seanloo.cn