QUESTION NO: 434
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A. RAID
B. Clustering
C. Redundancy
D. Virtualization
Answer: B
Explanation:
QUESTION NO: 435
An offsite location containing the necessary hardware without data redundancy would be an example of which of the following off-site contingency plans?
A. Cluster B.
Cold site C.
Warm site D.
Hot site
Answer: C
Explanation:
QUESTION NO: 436
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?
A. Identify user habits
B. Disconnect system from network
C. Capture system image
D. Interview witnesses
Answer: C
Explanation:
QUESTION NO: 437
Which of the following is BEST described as a scenario where organizational management decides not to provide a service offering because it presents an unacceptable risk to the organization? CompTIA Security+ SY0-301 Study Kit http://www.ecertified.org
A. Mitigation
B. Acceptance
C. Deterrence
D. Avoidance
Answer: D
Explanation:
QUESTION NO: 438
Which of the following is the primary security reason why Pete, a security administrator, should block social networking sites in a large corporation?
A. The proxy server needs to be specially configured for all social networking sites.
B. The data traffic can cause system strain and can overwhelm the firewall rule sets.
C. The users' work productivity decreases greatly.
D. The users can unintentionally post sensitive company information.
Answer: D
Explanation:
QUESTION NO: 439
Which of the following describes the importance of enacting and maintaining a clean desk policy?
A. To ensure that data is kept on encrypted network shares
B. To avoid passwords and sensitive data from being unsecured
C. To verify that users are utilizing data storage