CompTIA Security+ Practice Test 1 SY0-401 CompTIA Security+ Practice Test 1 SY0-401 When an employee discovers someone wandering around a secured area without a badge or escort, which user-awareness training topic should provide them with the proper response? A. Data handling B. Clean desk C. Situational awareness D. Personal technology Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption? A. AES B. Blowfish C. RC5 D. 3DES A systems administrator is tasked with auditing user privileges. Which of the following steps must be taken? (Select two correct answers.) A. Enable logging within the operating system. B. Enable auditing within the operating system. C. Specify the resources to be audited. D. Specify the audit file storage directory. Which of the following best describes the difference between a cipher lock and a wireless lock? A. A cipher lock is opened by a receiver mechanism, whereas a wireless lock has a punch code entry. B. A cipher lock is opened with a key, whereas a wireless lock has a remote control mechanism. C. A cipher lock is opened with a remote control mechanism, whereas a wireless lock is opened with a key. D. A cipher lock has a punch code entry, whereas a wireless lock is opened by a receiver mechanism. An administrator wants to reduce the size of the attack surface of Windows server 2008. Which of the following is the best answer to accomplish this? A. Update antivirus software. B. Install service packs. C. Disable unnecessary services. D. Install network intrusion detection systems. The policy preventing too much power leading to corruption is called the __________________ policy. A. Account Provisioning B. Least Privilege C. Separation of Duties D. Acceptable Which of the following is a security reason to implement virtualization in your network? A. To isolate network services and roles B. To analyze network traffic C. To add network services at lower costs D. To centralize patch management Which of the following describes an LDAP injection attack? A. Creating a copy of user credentials during the LDAP authentication session B. Manipulating an application’s LDAP query to gain or alter access rights C. Sending buffer overflow to the LDAP query service D. Using XSS to direct the user to a rogue LDAP server Antivirus software preserves which two elements of data security? A. Confidentiality and Integrity B. Integrity and Availability C. Availability and Confidentiality D. Accuracy and Reliability Which of the following best practices makes a wireless network more difficult to find? A. Implement MAC filtering B. UseWPA2-PSK C. Disable SSD broadcast D. Power down unused WAPs Loading … Question 1 of 10 More Tests A+ Practice Test A+ 220-901 and 220-902 Practice Test Network+ Practice Test Security+ Practice Test