CompTIA Security+ Practice Test 3 SY0-401 CompTIA Security+ Practice Test 3 SY0-401 What is the deadliest risk of a virtual computer? A. If a virtual computer fails, all other virtual computers immediately go offline. B. If a virtual computer fails, the physical server goes offline. C. If the physical server fails, all other physical servers immediately go offline. D. If the physical server fails, all the virtual computers immediately go offline. You have been tasked with protecting an operating system from malicious software. What should you do? (Select the two best answers.) A. Disable the DLP. B. Update the HIPS signatures. C. Install a perimeter firewall. D. Disable unused services. E. Update the NIDS signatures. The use of social networking sites introduces the risk of A. Disclosure of proprietary information B. Data classification issues C. Data availability issues D. Broken chain of custody Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems? A. SSH B. SCP C. SFTP D. SNMP Which of the following is not an advantage of NTFS over FAT32? A. NTFS supports file encryption. B. NTFS supports larger file sizes. C. NTFS supports larger volumes. D. NTFS supports more file formats. Which of the following combinations represents multifactor authentication? A. Smart card and hard token B. Voice print analysis and facial recognition C. Username and PIN D. Cipher lock combination and proximity badge What is the likelihood of a risk requiring corrective actions planned for implementation in a reasonable period of time? A. Very High B. High C. Medium D. Low Which of the following is Jane, a security administrator, MOST likely implementing when deleting all the unneeded files and modules of a newly installed application? A. Exception handling B. Patch management C. System file clean up D. Application hardening You are evaluating methods to manage the risk posed to your organization by hackers and decide that you will pursue a strategy of aggressively prosecuting anyone who attempts to break into your systems. What risk management strategy are you implementing? A. Risk mitigation B. Risk transference C. Risk deterrence D. Risk acceptance Which of the following best practices is commonly found at the end of router ACLs? A. Time of day restrictions B. Implicit deny C. Implicit allow D. Role-based access controls Loading … Question 1 of 10 More Tests A+ Practice Test A+ 220-901 and 220-902 Practice Test Network+ Practice Test Security+ Practice Test