Getting Smart with: comptia sy0 401


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q411. Which of the following types of encryption will help in protecting files on a PED? 

A. Mobile device encryption 

B. Transport layer encryption 

C. Encrypted hidden container 

D. Database encryption 

Answer:

Explanation: 

Device encryption encrypts the data on a Personal Electronic Device (PED). This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. 


Q412. Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk? 

A. Incident management 

B. Clean desk policy 

C. Routine audits 

D. Change management 

Answer:

Explanation: 

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. This structured approach involves policies that should be in place and technological controls that should be enforced. 


Q413. While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing? 

A. EAP-TLS 

B. PEAP 

C. WEP 

D. WPA 

Answer:

Explanation: 

WEP is one of the more vulnerable security protocols. The only time to use WEP is when you must have compatibility with older devices that do not support new encryption. 


Q414. Which of the following helps to establish an accurate timeline for a network intrusion? 

A. Hashing images of compromised systems 

B. Reviewing the date of the antivirus definition files 

C. Analyzing network traffic and device logs 

D. Enforcing DLP controls at the perimeter 

Answer:

Explanation: 


Q415. Which of the following is used by the recipient of a digitally signed email to verify the identity of the sender? 

A. Recipient’s private key 

B. Sender’s public key 

C. Recipient’s public key 

D. Sender’s private key 

Answer:

Explanation: 

When the sender wants to send a message to the receiver. It’s important that this message not be altered. The sender uses the private key to create a digital signature. The message is, in effect, signed with the private key. The sender then sends the message to the receiver. The recipient uses the public key attached to the message to validate the digital signature. If the values match, the receiver knows the message is authentic. Thus the recipient uses the sender’s public key to verify the sender’s identity. 


Q416. Which of the following cryptographic algorithms is MOST often used with IPSec? 

A. Blowfish 

B. Twofish 

C. RC4 

D. HMAC 

Answer:

Explanation: 

The HMAC-MD5-96 (also known as HMAC-MD5) encryption technique is used by IPSec to make sure that a message has not been altered. 


Q417. A company determines a need for additional protection from rogue devices plugging into physical ports around the building. 

Which of the following provides the highest degree of protection from unauthorized wired network access? 

A. Intrusion Prevention Systems 

B. MAC filtering 

C. Flood guards 

D. 802.1x 

Answer:

Explanation: 

IEEE 802.1x is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols and provides an authentication mechanism to wireless devices connecting to a LAN or WLAN. 


Q418. A file on a Linux server has default permissions of rw-rw-r--. The system administrator has verified that Ann, a user, is not a member of the group owner of the file. Which of the following should be modified to assure that Ann has read access to the file? 

A. User ownership information for the file in question 

B. Directory permissions on the parent directory of the file in question 

C. Group memberships for the group owner of the file in question 

D. The file system access control list (FACL) for the file in question 

Answer:

Explanation: 


Q419. Which of the following hardware based encryption devices is used as a part of multi-factor authentication to access a secured computing system? 

A. Database encryption 

B. USB encryption 

C. Whole disk encryption 

D. TPM 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Q420. A security administrator forgets their card to access the server room. The administrator asks a coworker if they could use their card for the day. Which of the following is the administrator using to gain access to the server room? 

A. Man-in-the-middle 

B. Tailgating 

C. Impersonation 

D. Spoofing 

Answer:

Explanation: 

Impersonation is where a person, computer, software application or service pretends to be someone or something it’s not. Impersonation is commonly non-maliciously used in client/server applications. However, it can also be used as a security threat. 

In this question, by using the coworker’s card, the security administrator is ‘impersonating’ the coworker. The server room locking system and any logging systems will ‘think’ that the coworker has entered the server room.