Questions Ask for comptia security+ study guide sy0 401

Exam Code: comptia sy0 401 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Security+ Certification
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass sy0 401 study guide pdf Exam.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q651. Which of the following results in datacenters with failed humidity controls? (Select TWO). 

A. Excessive EMI 

B. Electrostatic charge 

C. Improper ventilation 

D. Condensation 

E. Irregular temperature 

Answer: B,D 

Explanation: 

Humidity control prevents the buildup of static electricity in the environment. If the humidity drops much below 50 percent, electronic components are extremely vulnerable to damage from electrostatic shock. Most environmental systems also regulate humidity; however, a malfunctioning system can cause the humidity to be almost entirely extracted from a room. Make sure that environmental systems are regularly serviced. Electrostatic damage can occur when humidity levels get too low. Condensation is a direct result from failed humidity levels. 


Q652. Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Pete’s BEST option? 

A. Use hardware already at an offsite location and configure it to be quickly utilized. 

B. Move the servers and data to another part of the company’s main campus from the server room. 

C. Retain data back-ups on the main campus and establish redundant servers in a virtual environment. 

D. Move the data back-ups to the offsite location, but retain the hardware on the main campus for redundancy. 

Answer:

Explanation: 

A warm site provides some of the capabilities of a hot site, but it requires the customer to do more work to become operational. Warm sites provide computer systems and compatible media capabilities. If a warm site is used, administrators and other staff will need to install and configure systems to resume operations. For most organizations, a warm site could be a remote office, a leased facility, or another organization with which yours has a reciprocal agreement. Warm sites may be for your exclusive use, but they don’t have to be. A warm site requires more advanced planning, testing, and access to media for system recovery. Warm sites represent a compromise between a hot site, which is very expensive, and a cold site, which isn’t preconfigured. 


Q653. Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails resulting in system outages? 

A. Risk transference 

B. Change management 

C. Configuration management 

D. Access control revalidation 

Answer:

Explanation: 

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. In this case ‘scheduled system patching’. 


Q654. Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie? 

A. Network based firewall 

B. Anti-spam software 

C. Host based firewall 

D. Anti-spyware software 

Answer:

Explanation: 

Spyware monitors a user’s activity and uses network protocols to reports it to a third party without the user’s knowledge. This is usually accomplished using a tracking cookie. 


Q655. Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described? 

A. Phishing 

B. Tailgating 

C. Pharming 

D. Vishing 

Answer:

Explanation: 

Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities. Vishing works like phishing but does not always occur over the Internet and is carried out using voice technology. A vishing attack can be conducted by voice email, VoIP (voice over IP), or landline or cellular telephone. The potential victim receives a message, often generated by speech synthesis, indicating that suspicious activity has taken place in a credit card account, bank account, mortgage account or other financial service in their name. The victim is told to call a specific telephone number and provide information to "verify identity" or to "ensure that fraud does not occur." If the attack is carried out by telephone, caller ID spoofing can cause the victim's set to indicate a legitimate source, such as a bank or a government agency. 

Vishing is difficult for authorities to trace, particularly when conducted using VoIP. Furthermore, like many legitimate customer services, vishing scams are often outsourced to other countries, which may render sovereign law enforcement powerless. 

Consumers can protect themselves by suspecting any unsolicited message that suggests they are targets of illegal activity, no matter what the medium or apparent source. Rather than calling a number given in any unsolicited message, a consumer should directly call the institution named, using a number that is known to be valid, to verify all recent activity and to ensure that the account information has not been tampered with. 


Q656. A security administrator must implement a secure key exchange protocol that will allow company clients to autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the following MUST be implemented? 

A. SHA-256 

B. AES 

C. Diffie-Hellman 

D. 3DES 

Answer:

Explanation: 


Q657. Which of the following can result in significant administrative overhead from incorrect reporting? 

A. Job rotation 

B. Acceptable usage policies 

C. False positives 

D. Mandatory vacations 

Answer:

Explanation: 

False positives are essentially events that are mistakenly flagged and are not really events to be concerned about. This causes a significant administrative overhead because the reporting is what results in the false positives. 


Q658. An organization has three divisions: Accounting, Sales, and Human Resources. Users in the Accounting division require access to a server in the Sales division, but no users in the Human Resources division should have access to resources in any other division, nor should any users in the Sales division have access to resources in the Accounting division. Which of the following network segmentation schemas would BEST meet this objective? 

A. Create two VLANS, one for Accounting and Sales, and one for Human Resources. 

B. Create one VLAN for the entire organization. 

C. Create two VLANs, one for Sales and Human Resources, and one for Accounting. 

D. Create three separate VLANS, one for each division. 

Answer:

Explanation: 


Q659. Three of the primary security control types that can be implemented are. 

A. Supervisory, subordinate, and peer. 

B. Personal, procedural, and legal. 

C. Operational, technical, and management. 

D. Mandatory, discretionary, and permanent. 

Answer:

Explanation: 

The National Institute of Standards and Technology (NIST) places controls into various types. The control types fall into three categories: Management, Operational, and Technical. 


Q660. An administrator implements SELinux on a production web server. After implementing this, the web server no longer serves up files from users' home directories. To rectify this, the administrator creates a new policy as the root user. This is an example of which of the following? (Select TWO). 

A. Enforcing SELinux in the OS kernel is role-based access control 

B. Enforcing SELinux in the OS kernel is rule-based access control 

C. The policy added by the root user is mandatory access control 

D. Enforcing SELinux in the OS kernel is mandatory access control 

E. The policy added by the root user is role-based access control 

F. The policy added by the root user is rule-based access control 

Answer: D,F 

Explanation: