Top CompTIA SY0-401 item pool Choices

It is more faster and easier to pass the CompTIA SY0-401 exam by using Best Quality CompTIA CompTIA Security+ Certification questuins and answers. Immediate access to the Regenerate SY0-401 Exam and find the same core area SY0-401 questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

2021 Apr SY0-401 real exam

Q151. A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need access to sales. Which of the following should be implemented to give the appropriate access while enforcing least privilege? 

A. Assign individual permissions to users 1 and 2 for payroll. Assign individual permissions to users 4 and 5 for sales. Make user 3 an administrator. 

B. Make all users administrators and then restrict users 1 and 2 from sales. Then restrict users 4 and 5 from payroll. 

C. Create two additional generic accounts, one for payroll and one for sales that users utilize. 

D. Create a sales group with users 3, 4 and 5. Create a payroll group with users 1, 2 and 3. 

Answer:

Explanation: 


Q152. The loss prevention department has purchased a new application that allows the employees to monitor the alarm systems at remote locations. However, the application fails to connect to the vendor's server and the users are unable to log in. Which of the following are the MOST likely causes of this issue? (Select TWO). 

A. URL filtering 

B. Role-based access controls 

C. MAC filtering 

D. Port Security 

E. Firewall rules 

Answer: A,E 

Explanation: 


Q153. Which of the following technical controls is BEST used to define which applications a user can install and run on a company issued mobile device? 

A. Authentication 

B. Blacklisting 

C. Whitelisting 

D. Acceptable use policy 

Answer:

Explanation: 

White lists are closely related to ACLs and essentially, a white list is a list of items that are allowed. 


Q154. Which of the following practices is used to mitigate a known security vulnerability? 

A. Application fuzzing 

B. Patch management 

C. Password cracking 

D. Auditing security logs 

Answer:

Explanation: 

Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps protect a systems from new attacks and vulnerabilities that have recently become known. 


Q155. Which of the following attacks impact the availability of a system? (Select TWO). 

A. Smurf 

B. Phishing 

C. Spim 

D. DDoS 

E. Spoofing 

Answer: A,D 

Explanation: 


Up to the immediate present SY0-401 test question:

Q156. Which of the following statements is MOST likely to be included in the security awareness training about P2P? 

A. P2P is always used to download copyrighted material. 

B. P2P can be used to improve computer system response. 

C. P2P may prevent viruses from entering the network. 

D. P2P may cause excessive network bandwidth. 

Answer:

Explanation: 

P2P networking by definition involves networking which will reduce available bandwidth for the rest of the users on the network. 


Q157. Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to? 

A. PAP, MSCHAPv2 

B. CHAP, PAP 

C. MSCHAPv2, NTLMv2 

D. NTLM, NTLMv2 

Answer:

Explanation: 

PAP transmits the username and password to the authentication server in plain text. MSCHAPv2 is utilized as an authentication option for RADIUS servers that are used for Wi-Fi security using the WPA-Enterprise protocol. 


Q158. A network engineer is setting up a network for a company. There is a BYOD policy for the employees so that they can connect their laptops and mobile devices. 

Which of the following technologies should be employed to separate the administrative network from the network in which all of the employees’ devices are connected? 

A. VPN 

B. VLAN 

C. WPA2 

D. MAC filtering 

Answer:

Explanation: 

A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function. 


Q159. What is the term for the process of luring someone in (usually done by an enforcement officer or a government agent)? 

A. Enticement 

B. Entrapment 

C. Deceit 

D. Sting 

Answer:

Explanation: 

Enticement is the process of luring someone into your plan or trap. 


Q160. A customer service department has a business need to send high volumes of confidential information to customers electronically. All emails go through a DLP scanner. Which of the following is the BEST solution to meet the business needs and protect confidential information? 

A. Automatically encrypt impacted outgoing emails 

B. Automatically encrypt impacted incoming emails 

C. Monitor impacted outgoing emails 

D. Prevent impacted outgoing emails 

Answer:

Explanation: 

Encryption is done to protect confidentiality and integrity of data. It also provides authentication, nonrepudiation and access control to the data. Since all emails go through a DLP scanner and it is outgoing main that requires protection then the best option is to put a system in place that will encrypt the outgoing emails automatically.