CompTIA Security+ Practice Test 4 SY0-401 CompTIA Security+ Practice Test 4 SY0-401 You finished installing the operating system for a home user. What are three good methods to implement to secure that operating system? (Select the three best answers.) A. Install the latest service pack. B. Install a hardware- or software-based firewall. C. Install the latest patches. D. Install pcAnywhere. Which of the following tools is used to review the effects of Group Policy settings on a particular computer? A. Resultant Set of Policy B. Group Policy object C. Gpupdate D. Local Security settings Which of the following would an administrator use to end applications that get hung up without having to reboot the machine? A. Network Monitor B. Task Manager C. Event Viewer D. Performance Console Which of the following is not going to be part of a standard password policy? A. Establishing a minimum password length B. Selection of a strong password C. Establishing password expiration schedules D. Barring keeping written passwords Which of the following would be the first place an administrator would look when troubleshooting UNIX- or Linux-based systems? A. Mtools.conf B. Msconfig C. Event Viewer D. Syslogd Which of the following type of surveillance would the organization implement if it was required that the parking lot be constantly monitored? A. CCTV cameras B. Security guards C. Keycard gate D. Motion detectors Which of the following is the primary goal of a physical security plan? A. To deny access to most users allowing only corporate officers B. To allow access to all visitors without causing undue duress C. To allow only trusted use of resources via positive identification D. To deny access to all except users deemed credible Virtualized browsers can protect the OS that they are installed within from which of the following? A. DDoS attacks against the underlying OS B. Phishing and spam attacks C. Man-in-the-middle attacks D. Malware installation from Internet websites Which option enables you to hide ntldr? A. Enable Hide Protected Operating System Files B. Disable Show Hidden Files and Folders C. Disable Hide Protected operating system Files D. Remove the -R Attribute Which of the following are effective ways to protect the network infrastructure from attacks aimed at antiquated or unused ports and protocols? (Select all correct answers.) A. Keeping only protocols installed by default B. Allowing traffic only on necessary ports C. Removing any unnecessary protocols D. Allowing only traffic requested by users Loading … Question 1 of 10 More Tests A+ Practice Test A+ 220-901 and 220-902 Practice Test Network+ Practice Test Security+ Practice Test