100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

401 SEC+ Exam Guaranteed Pass: Handpicked Questions Curated for Success, Complete with Correct Answers and Expert-Verified Explanations to Ensure Top Performance and Mastery of Key Concepts.

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
25-12-2024
Written in
2024/2025

401 SEC+ Exam Guaranteed Pass: Handpicked Questions Curated for Success, Complete with Correct Answers and Expert-Verified Explanations to Ensure Top Performance and Mastery of Key Concepts.

Institution
401 SEC+
Course
401 SEC+










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
401 SEC+
Course
401 SEC+

Document information

Uploaded on
December 25, 2024
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • 401 sec exam
  • 2024 exam

Content preview

401 SEC+ Exam Guaranteed Pass: Handpicked
Questions from Elite Universities with Thorough
Explanations and A+ Graded Insights
Matt, a security administrator, wants to configure all the switches and routers in the
network in order to securely monitor their status. Which of the following protocols would
he need to configure on each device?

A. SMTP

B. SNMPv3

C. IPSec

D. SNMP - -correct ans- -Answer: B



Explanation:

Currently, SNMP is predominantly used for monitoring and performance management.
SNMPv3 defines a secure version of SNMP and also facilitates remote configuration of the
SNMP entities.



A recent vulnerability scan found that Telnet is enabled on all network devices. Which of
the following protocols should be used instead of Telnet?

A. SCP

B. SSH

C. SFTP

D. SSL - -correct ans- -Answer: B



Explanation:

SSH transmits both authentication traffic and data in a secured encrypted form, whereas
Telnet transmits both authentication credentials and data in clear text.

,Which of the following is BEST used as a secure replacement for TELNET?

A. HTTPS

B. HMAC

C. GPG

D. SSH - -correct ans- -Answer: D



Explanation:

SSH transmits both authentication traffic and data in a secured encrypted form, whereas
Telnet transmits both authentication credentials and data in clear text




Which of the following should be implemented to stop an attacker from mapping out
addresses and/or devices on a network?

A. Single sign on

B. IPv6

C. Secure zone transfers

D. VoIP - -correct ans- -Answer: C



Explanation:

C: A primary DNS server has the "master copy" of a zone, and secondary DNS servers keep
copies of the zone for redundancy. When changes are made to zone data on the primary
DNS server, these changes must be distributed to the secondary DNS servers for the zone.
This is done through zone transfers. If you allow zone transfers to any server, all the
resource records in the zone are viewable by any host that can contact your DNS server.
Thus you will need to secure the zone transfers to stop an attacker from mapping out your
addresses and devices on your network.

, A security engineer, Joe, has been asked to create a secure connection between his mail
server and the mail server of a business partner. Which of the following protocol would be
MOST appropriate?

A. HTTPS

B. SSH

C. FTP

D. TLS - -correct ans- -Answer: D



Explanation:

Transport Layer Security (TLS) is a cryptographic protocol designed to provide
communications security over a computer network. It uses X.509 certificates and hence
asymmetric cryptography to authenticate the counterparty with whom it is communicating,
and to exchange a symmetric key. The TLS protocol allows client-server applications to
communicate across a network in a way designed to prevent eavesdropping and
tampering.



Which of the following protocols is used to authenticate the client and server's digital
certificate?

A. PEAP

B. DNS

C. TLS

D. ICMP - -correct ans- -Answer: C



Explanation:

Transport Layer Security (TLS) is a cryptographic protocol designed to provide
communications security over a computer network. It uses X.509 certificates and hence
asymmetric cryptography to authenticate the counterparty with whom it is communicating,
and to exchange a symmetric key.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
qualityexamshut Wgu
View profile
Follow You need to be logged in order to follow users or courses
Sold
47
Member since
1 year
Number of followers
22
Documents
1032
Last sold
1 month ago

4.9

218 reviews

5
205
4
10
3
1
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions