We promise that you can get over the CompTIA CompTIA exam with ease. Each of our experienced professionals are generally devoted in order to updating the CompTIA SY0-401 exam dumps. It is possible to keep faith in us and we provide 100% money back. If you have got something wrong using our SY0-401 practice products, please contact us timely. We have 24/7 customer program.

2021 Jan SY0-401 practice question

Q571. Which of the following is the default port for TFTP? 

A. 20 

B. 69 

C. 21 

D. 68 

Answer:

Explanation: 

TFTP makes use of UDP port 69. 


Q572. Which of the following can be implemented with multiple bit strength? 

A. AES 

B. DES 

C. SHA-1 

D. MD5 

E. MD4 

Answer:

Explanation: 

AES (a symmetric algorithm) uses key sizes of 128, 192, or 256 bits. 


Q573. A company determines a need for additional protection from rogue devices plugging into physical ports around the building. 

Which of the following provides the highest degree of protection from unauthorized wired network access? 

A. Intrusion Prevention Systems 

B. MAC filtering 

C. Flood guards 

D. 802.1x 

Answer:

Explanation: 

IEEE 802.1x is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols and provides an authentication mechanism to wireless devices connecting to a LAN or WLAN. 


Q574. Which of the following is the MOST specific plan for various problems that can arise within a system? 

A. Business Continuity Plan 

B. Continuity of Operation Plan 

C. Disaster Recovery Plan 

D. IT Contingency Plan 

Answer:

Explanation: 

An IT contingency plan would focus on the IT aspect in particular to ensure business continuity. 


Q575. An administrator is assigned to monitor servers in a data center. A web server connected to the Internet suddenly experiences a large spike in CPU activity. Which of the following is the MOST likely cause? 

A. Spyware 

B. Trojan 

C. Privilege escalation 

D. DoS 

Answer:

Explanation: 

A Distributed Denial of Service (DDoS) attack is a DoS attack from multiple computers whereas a DoS attack is from a single computer. In terms of the actual method of attack, DDoS and DoS attacks are the same. One common method of attack involves saturating the target machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example a botnet) flooding the targeted system with traffic. When a server is overloaded with connections, new connections can no longer be accepted. The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track and shut down. These attacker advantages cause challenges for defense mechanisms. For example, merely purchasing more incoming bandwidth than the current volume of the attack might not help, because the attacker might be able to simply add more attack machines. This after all will end up completely crashing a website for periods of time. Malware can carry DDoS attack mechanisms; one of the better-known examples of this was MyDoom. Its DoS mechanism was triggered on a specific date and time. This type of DDoS involved hardcoding the target IP address prior to release of the malware and no further interaction was necessary to launch the attack. 


Improved SY0-401 braindumps:

Q576. Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save money while providing valuable services. She is looking for a cost-effective solution to assist in capacity planning as well as visibility into the performance of the network. Which of the following cloud technologies should she look into? 

A. IaaS 

B. MaaS 

C. SaaS 

D. PaaS 

Answer:

Explanation: 


Q577. Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and corporate data is stolen. Which of the following would BEST prevent this from occurring again? 

A. Disable the wireless access and implement strict router ACLs. 

B. Reduce restrictions on the corporate web security gateway. 

C. Security policy and threat awareness training. 

D. Perform user rights and permissions reviews. 

Answer:

Explanation: 

BYOD (In this case Sara’s smart phone) involves the possibility of a personal device that is infected with malware introducing that malware to the network and security awareness training will address the issue of the company’s security policy with regard to BYOD. 


Q578. Which of the following pseudocodes can be used to handle program exceptions? 

A. If program detects another instance of itself, then kill program instance. 

B. If user enters invalid input, then restart program. 

C. If program module crashes, then restart program module. 

D. If user’s input exceeds buffer length, then truncate the input. 

Answer:

Explanation: 

Exception handling is an aspect of secure coding. When errors occur, the system should revert back to a secure state. This must be coded into the system by the programmer, and should capture all errors and exceptions that could cause the application or its modules to crash. Restarting the application or module would ensure that the application reverts back to a secure state. 


Q579. Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privilege principles? 

A. User rights reviews 

B. Incident management 

C. Risk based controls 

D. Annual loss expectancy 

Answer:

Explanation: 

A least privilege policy should be used when assigning permissions. Give users only the permissions and rights that they need to do their work and no more. 


Q580. Several employees submit the same phishing email to the administrator. The administrator finds that the links in the email are not being blocked by the company’s security device. Which of the following might the administrator do in the short term to prevent the emails from being received? 

A. Configure an ACL 

B. Implement a URL filter 

C. Add the domain to a block list 

D. Enable TLS on the mail server 

Answer:

Explanation: 

Blocking e-mail is the same as preventing the receipt of those e-mails and this is done by applying a filter. But the filter must be configured to block it. Thus you should add that specific domain from where the e-mails are being sent to the list of addresses that is to be blocked.