2014 Latest CompTIA LX0-102 Exam Demo Free Download!

QUESTION 1 When attempting to send a file to another user securely with GPG, which of the following actions must be done? A.    Encrypt the file using your public key. B.    Encrypt the file using their public key. C.    Encrypt the file using your private key. D.    Encrypt the file using their private key. E.   

2014 Latest CompTIA SG0-001 Exam Demo Free Download!

QUESTION 1 An administrator is attempting to recover corrupted data from a four disk RAID group. However, the administrator does not know which RAID level was used. When investigating the volumes, the administrator notes that there is a duplicate of all data on two of the disks. Which of the following RAID levels was in

2014 Latest CompTIA 220-802 Exam Demo Free Download!

QUESTION 1 A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO). A.    Install additional antivirus software B.    Disable screen savers C.    Conduct a daily security audit D.   

2014 Latest CompTIA Network+ N10-005 Exam Demo Free Download!

QUESTION 1 New Simulation: Crimp out a T568B. Answer: White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown. Explanation:   QUESTION 2 A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following? A.    Signature based IDS B.    Behavior based IPS C.   

2014 Latest CompTIA Security+ SY0-301 Exam Demo Free Download!

QUESTION 1 An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire? A.    Install a proxy server between the users’ computers and the switch to

Official 2014 Latest CompTIA SY0-401 Demo Free Download!

QUESTION 1 Which of the following protocols operates at the HIGHEST level of the OSI model? A.    ICMP B.    IPSec C.    SCP D.    TCP Answer: C QUESTION 2 Which of the following should an administrator implement to research current attack methodologies? A.    Design reviews B.    Honeypot C.    Vulnerability scanner D.    Code reviews Answer: B QUESTION