|CompTIA CN0-201 : CompTIA CTP+ Certification Exam||302 Questions & Answers||Updated: Feb 12,17|
Immediate access to the CompTIA CN0-201 Exam and 1800+ other exam PDFs.
This is the BEST deal at only $149.00 for unlimited access. Pass FAST with actual answers to actual questions - We Guarantee You Pass!
Both of our Exams Packages come with all of our CompTIA Exams including all ActualTests CN0-201 tests. Find the same core area CompTIA questions with professionally verified answers, and PASS YOUR EXAM.
Option 1: CN0-201 exam and 1,800+ Other Exams
OR - Upgrade the Unlimited Access Package to include our Exam Engine. Know more than just the answers, understand the solutions! There is an Exam Engine for each of the 1,800 tests, including CompTIA CN0-201. Why Upgrade?
Option 2: CN0-201 exam, 1,800+ Other Exams PLUS Exam Engine
ActualTests CN0-201 Exam Engine Features
Customize your CompTIA CTP+ Certification Exam certification experience.
CompTIA CN0-201 Exam Tips
During routine monitoring you discover that a user accessed the network without permission. What should you do?
A. Your best option would be to establish the business impact.
B. Your best option would be to contain the problem. (correct)
C. Your best option would be to inform law enforcement officials.
D. Your best option would be to inform management.
Which command will show the current network connections during a live response to an illegal access when a command is performed on an investigated workstation?
A. The NETSTAT command will display the current network connections. (correct)
B. The netcat command will display the current network connections.
C. The IPCONFIG / IFCONFIG command will display the current network connections.
D. The nmap command will display the current network connections.
What do you need to make sure that a user is unable to deny receiving e-mail messages?
A. You need Non-repudiation. (correct)
B. You need Data integrity.
C. You need Asymmetric cryptography.
D. You need Anti-aliasing.
With regard to CRLs (Certificate Revocation Lists), which of the following are true?
A. A CLR (Certificate Revocation List) query that receives a response in near real time indicates that high availability equipment is used.
B. A CLR (Certificate Revocation List) query that receives a response in near real time implies that a fault tolerant database is being used.
C. A CLR (Certificate Revocation List) query that receives a response in near real time does not guarantee that fresh data is being returned. (correct)
D. A CLR (Certificate Revocation List) query that receives a response in near real time indicates that the CA (Certificate Authority) is providing near real time updates.
A certificate revocation list is a list kept by a certificate authority that lists off sites who's certificates have expired, or been revoked for security breaches. The problem with them is that, although it is possible to get an immediate response, the data that is on the list has up to a 24 hour update delay. For this reason Online Certificate Status Protocol (OCSP) is better.
Which of the following PKI documents outlines the PKI's use, management and deployment?
A. PKI policy. (correct)
B. PKI procedure.
C. PKI practice.
D. Best practices guideline.
Definition of Policy - course of action, guiding principle, or procedure considered expedient, prudent, or advantageous.
Determine the PKI architecture approach that uses software on a computer to create a key pad?
A. It is an example of Hub and spoke approach.
B. It is an example of Distributed key approach.
C. It is an example of Decentralized approach. (correct)
D. It is an example of Centralized approach.
Which of the following encryption keys is used to verify a digital signature?
A. The signer's public key. (correct)
B. The signer's private key.
C. The recipient's public key.
D. The recipient's private key.
The sender uses their private key to 'sign' the message, but the receiver uses their 'public' key to verify the signature on the message.
Which of the following does a recipient use, together with the hash value, to verify a digital signature?
A. The signer's private key.
B. The receiver's private key.
C. The signer's public key. (correct)
D. The receiver's public key.
Here's an example; if you want to digitally sign an email, your special email client will give you a hash, your PRIVATE KEY will encrypt the hash, and when the recipient of your email receives the email they will use their software to hash the message, then use your PUBLIC KEY to decrypt the hash, and it the hashes match the message is valid.
Which of the following encryption algorithms is a block cipher an example of?
A. asymmetric key
B. public key
C. symmetric key (correct)
A block cipher is a symmetric key encryption that takes a number of bits and encrypts them as a single unit. Some popular block ciphers are: DES, 3DES, AES ( Rijndael ), Blowfish, IDEA, RC2, RC5 ,RC6 , CAST,MARS, Serpent, Twofish .
Related Certifications Included
Related CTP+ Exams Included
All Major Credit CardsWe accept Visa, Mastercard, Electron and American Express. You can also pay us via PayPal.
SSL Secure Transactions