Our CompTIA SY0-401 exam braindumps tend to be updated regularly according to the particular CompTIA real examination. And you can enjoy the CompTIA revisions for 120 days free after acquire. Please keep visiting each of our website and confirm if there are several latest CompTIA SY0-401 practice questions. Help make your CompTIA SY0-401 exam dumps upgraded timely and make full preparation for the CompTIA SY0-401 exam. All of us also supply online after-sale program for 24 hours. Dons hesitate to contact us to seek for any kind of help. All of us will resolve your issues as before long as achievable.

2021 Mar SY0-401 exam topics

Q91. Which of the following can only be mitigated through the use of technical controls rather that user security training? 

A. Shoulder surfing 

B. Zero-day 

C. Vishing 

D. Trojans 

Answer:

Explanation: 

A zero day vulnerability is an unknown vulnerability in a software application. This cannot be prevented by user security training. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. 


Q92. A way to assure data at-rest is secure even in the event of loss or theft is to use: 

A. Full device encryption. 

B. Special permissions on the file system. 

C. Trusted Platform Module integration. 

D. Access Control Lists. 

Answer:

Explanation: 

Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. 


Q93. A security administrator is tackling issues related to authenticating users at a remote site. There have been a large number of security incidents that resulted from either tailgating or impersonation of authorized users with valid credentials. The security administrator has been told to implement multifactor authentication in order to control facility access. To secure access to the remote facility, which of the following could be implemented without increasing the amount of space required at the entrance? 

A. MOTD challenge and PIN pad 

B. Retina scanner and fingerprint reader 

C. Voice recognition and one-time PIN token 

D. One-time PIN token and proximity reader 

Answer:

Explanation: 


Q94. Which of the following offerings typically allows the customer to apply operating system patches? 

A. Software as a service 

B. Public Clouds 

C. Cloud Based Storage 

D. Infrastructure as a service 

Answer:

Explanation: 

Cloud users install operating-system images and their application software on the cloud infrastructure to deploy their applications. In this model, the cloud user patches and maintains the operating systems and the application software. 


Q95. A database administrator receives a call on an outside telephone line from a person who states that they work for a well-known database vendor. The caller states there have been problems applying the newly released vulnerability patch for their database system, and asks what version is being used so that they can assist. Which of the following is the BEST action for the administrator to take? 

A. Thank the caller, report the contact to the manager, and contact the vendor support line to verify any reported patch issues. 

B. Obtain the vendor’s email and phone number and call them back after identifying the number of systems affected by the patch. 

C. Give the caller the database version and patch level so that they can receive help applying the patch. 

D. Call the police to report the contact about the database systems, and then check system logs for attack attempts. 

Answer:

Explanation: 

Impersonation is where a person, computer, software application or service pretends to be someone or something it’s not. Impersonation is commonly non-maliciously used in client/server applications. However, it can also be used as a security threat. 

In this question, the person making the call may be impersonating someone who works for a well-known database vendor. The actions described in this answer would mitigate the risk. By not divulging information about your database system and contacting the vendor directly, you can be sure that you are talking to the right people. 


Renew SY0-401 free practice exam:

Q96. Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive client files had risen far above normal. Which of the following kind of IDS is in use? 

A. Protocol based 

B. Heuristic based 

C. Signature based 

D. Anomaly based 

Answer:

Explanation: 


Q97. An employee connects a wireless access point to the only jack in the conference room to provide Internet access during a meeting. The access point is configured to use WPA2-TKIP. A malicious user is able to intercept clear text HTTP communication between the meeting attendees and the Internet. Which of the following is the reason the malicious user is able to intercept and see the clear text communication? 

A. The malicious user has access to the WPA2-TKIP key. 

B. The wireless access point is broadcasting the SSID. 

C. The malicious user is able to capture the wired communication. 

D. The meeting attendees are using unencrypted hard drives. 

Answer:

Explanation: 


Q98. A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted? 

A. RADIUS 

B. TACACS+ 

C. Kerberos 

D. LDAP 

Answer:

Explanation: 

TACACS makes use of TCP port 49 by default. 


Q99. Which of the following offers the LEAST secure encryption capabilities? 

A. TwoFish 

B. PAP 

C. NTLM 

D. CHAP 

Answer:

Explanation: 

PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like CHAP or EAP. 


Q100. Access mechanisms to data on encrypted USB hard drives must be implemented correctly otherwise: 

A. user accounts may be inadvertently locked out. 

B. data on the USB drive could be corrupted. 

C. data on the hard drive will be vulnerable to log analysis. 

D. the security controls on the USB drive can be bypassed. 

Answer:

Explanation: 

A common access mechanism to data on encrypted USB hard drives is a password. If a weak password is used, someone could guess the password and bypass the security controls on the USB drive to access the data.