A good CompTIA SY0-401 Accreditation will help one inch upcoming situation as well as job opportunities and many certified CompTIA databases facilitators work with many rather enhance data programs. CompTIA exercising is invariably of great help for just about any It all specialized to get a CompTIA plus will help one inch touchdown lucrative career during several international organizations.

2021 Dec SY0-401 test

Q151. Which of the following practices is used to mitigate a known security vulnerability? 

A. Application fuzzing 

B. Patch management 

C. Password cracking 

D. Auditing security logs 

Answer:

Explanation: 

Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps protect a systems from new attacks and vulnerabilities that have recently become known. 


Q152. Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT group, to edit a file. Currently, the file has the following permissions: Ann: read/write 

Sales Group: read 

IT Group: no access 

If a discretionary access control list is in place for the files owned by Ann, which of the following would be the BEST way to share the file with Joe? 

A. Add Joe to the Sales group. 

B. Have the system administrator give Joe full access to the file. 

C. Give Joe the appropriate access to the file directly. 

D. Remove Joe from the IT group and add him to the Sales group. 

Answer:

Explanation: 


Q153. When confidentiality is the primary concern, and a secure channel for key exchange is not available, which of the following should be used for transmitting company documents? 

A. Digital Signature 

B. Symmetric 

C. Asymmetric 

D. Hashing 

Answer:

Explanation: 


Q154. Which of the following provides the LEAST availability? 

A. RAID 0 

B. RAID 1 

C. RAID 3 

D. RAID 5 

Answer:

Explanation: 

RAID, or redundant array of independent disks (RAID). RAID allows your existing servers to have more than one hard drive so that if the main hard drive fails, the system keeps functioning. RAID 0 is disk striping. It uses multiple drives and maps them together as a single physical drive. This is done primarily for performance, not for fault tolerance. If any drive in a RAID 0 array fails, the entire logical drive becomes unusable. 


Q155. A systems engineer has been presented with storage performance and redundancy requirements for a new system to be built for the company. The storage solution must be designed to support the highest performance and must also be able to support more than one drive failure. Which of the following should the engineer choose to meet these requirements? 

A. A mirrored striped array with parity 

B. A mirrored mirror array 

C. A striped array 

D. A striped array with parity 

Answer:

Explanation: 


Renovate SY0-401 torrent:

Q156. Which of the following has a storage root key? 

A. HSM 

B. EFS 

C. TPM 

D. TKIP 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates on non-volatile (NV) memory. Data stored on NV memory is retained unaltered when the device has no power. The storage root key is embedded in the TPM to protect TPM keys created by applications, so that these keys cannot be used without the TPM. 


Q157. Matt, a security administrator, wants to configure all the switches and routers in the network in order to securely monitor their status. Which of the following protocols would he need to configure on each device? 

A. SMTP 

B. SNMPv3 

C. IPSec 

D. SNMP 

Answer:

Explanation: Currently, SNMP is predominantly used for monitoring and performance management. SNMPv3 defines a secure version of SNMP and also facilitates remote configuration of the SNMP entities. 


Q158. A company has recently implemented a high density wireless system by having a junior technician install two new access points for every access point already deployed. Users are now reporting random wireless disconnections and slow network connectivity. Which of the following is the MOST likely cause? 

A. The old APs use 802.11a 

B. Users did not enter the MAC of the new APs 

C. The new APs use MIMO 

D. A site survey was not conducted 

Answer:

Explanation: 

To test the wireless AP placement, a site survey should be performed. 

Topic 2, Compliance and Operational Security 


Q159. Which of the following devices will help prevent a laptop from being removed from a certain location? 

A. Device encryption 

B. Cable locks 

C. GPS tracking 

D. Remote data wipes 

Answer:

Explanation: 

Cable locks are theft deterrent devices that can be used to tether a device to a fixed point keep smaller devices from being easy to steal. 


Q160. ION NO: 93 Which of the following is an advantage of implementing individual file encryption on a hard drive which already deploys full disk encryption? 

A. Reduces processing overhead required to access the encrypted files 

B. Double encryption causes the individually encrypted files to partially lose their properties 

C. Individually encrypted files will remain encrypted when copied to external media 

D. File level access control only apply to individually encrypted files in a fully encrypted drive 

Answer:

Explanation: 

With full disk encryption a file is encrypted as long as it remains on the disk. This is because the data on the disk is decrypted when the user logs on, thus the data is in a decrypted form when it is copied to another disk. Individually encrypted files on the other hand remain encrypted.