The CompTIA SY0-401 exam is one of the CompTIA certification exams. It examines the actual candidates abilities as well as skills to be able to operate as well as troubleshoot a network. Candidates may take the actual CompTIA CompTIA exam training study course at Pass4sure to obtain certified. The CompTIA SY0-401 study course includes printable Pdf courseware as well as downloadable test serp; exclusive learning zone that you can communicate with other candidates; stay chat with each of our instructors at anytime across the clock; passing guarantee that have data proof; one 12 months free upgrades policy.

2021 Dec SY0-401 latest exam

Q321. Protecting the confidentiality of a message is accomplished by encrypting the message with which of the following? 

A. Sender's private key 

B. Recipient's public key 

C. Sender's public key 

D. Recipient's private key 

Answer:

Explanation: 


Q322. Which of the following must be kept secret for a public key infrastructure to remain secure? 

A. Certificate Authority 

B. Certificate revocation list 

C. Public key ring 

D. Private key 

Answer:

Explanation: 

The private key, which is also called the secret key, must be kept secret. 


Q323. In which of the following steps of incident response does a team analyse the incident and determine steps to prevent a future occurrence? 

A. Mitigation 

B. Identification 

C. Preparation 

D. Lessons learned 

Answer:

Explanation: 

Incident response procedures involves in chronological order: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Thus lessons are only learned after the mitigation occurred. For only then can you ‘step back’ and analyze the incident to prevent the same occurrence in future. 


Q324. A security technician has been asked to recommend an authentication mechanism that will allow users to authenticate using a password that will only be valid for a predefined time interval. Which of the following should the security technician recommend? 

A. CHAP 

B. TOTP 

C. HOTP 

D. PAP 

Answer:

Explanation: Time-based one-time password (TOTP) tokens are devices or applications that generate passwords at fixed time intervals. Therefore, the password will only be valid for a predefined time interval. 


Q325. Which of the following common access control models is commonly used on systems to ensure a "need to know" based on classification levels? 

A. Role Based Access Controls 

B. Mandatory Access Controls 

C. Discretionary Access Controls 

D. Access Control List 

Answer:

Explanation: 

Mandatory Access Control allows access to be granted or restricted based on the rules of classification. MAC also includes the use of need to know. Need to know is a security restriction where some objects are restricted unless the subject has a need to know them. 


Down to date SY0-401 brain dumps:

Q326. After a production outage, which of the following documents contains detailed information on the order in which the system should be restored to service? 

A. Succession planning 

B. Disaster recovery plan 

C. Information security plan 

D. Business impact analysis 

Answer:

Explanation: 

A disaster-recovery plan, or scheme, helps an organization respond effectively when a disaster occurs. Disasters may include system failure, network failure, infrastructure failure, and natural disaster. The primary emphasis of such a plan is reestablishing services and minimizing losses. 


Q327. A technician is reviewing the logical access control method an organization uses. One of the senior managers requests that the technician prevent staff members from logging on during nonworking days. Which of the following should the technician implement to meet managements request? 

A. Enforce Kerberos 

B. Deploy smart cards 

C. Time of day restrictions 

D. Access control lists 

Answer:

Explanation: Time of day restrictions limit when users can access specific systems based on the time of day or week. It can limit access to sensitive environments to normal business hours. 


Q328. The loss prevention department has purchased a new application that allows the employees to monitor the alarm systems at remote locations. However, the application fails to connect to the vendor's server and the users are unable to log in. Which of the following are the MOST likely causes of this issue? (Select TWO). 

A. URL filtering 

B. Role-based access controls 

C. MAC filtering 

D. Port Security 

E. Firewall rules 

Answer: A,E 

Explanation: 


Q329. Which of the following is used by the recipient of a digitally signed email to verify the identity of the sender? 

A. Recipient’s private key 

B. Sender’s public key 

C. Recipient’s public key 

D. Sender’s private key 

Answer:

Explanation: 

When the sender wants to send a message to the receiver. It’s important that this message not be altered. The sender uses the private key to create a digital signature. The message is, in effect, signed with the private key. The sender then sends the message to the receiver. The recipient uses the public key attached to the message to validate the digital signature. If the values match, the receiver knows the message is authentic. Thus the recipient uses the sender’s public key to verify the sender’s identity. 


Q330. In order to secure additional budget, a security manager wants to quantify the financial impact of a one-time compromise. Which of the following is MOST important to the security manager? 

A. Impact 

B. SLE 

C. ALE 

D. ARO 

Answer:

Explanation: