All the CompTIA SY0-401 exam training materials at Testking are accessible in Pdf formats after acquire. You can download your test motor on your PC to adopt the CompTIA SY0-401 simulated tests in your house. The CompTIA CompTIA exam demos might be printed and you can practice them at your convenience. Many of us guarantee that you will pass your CompTIA SY0-401 exam by making use of Testkings practice questions and answers. The questions are logical along with technical; the answers are generally accurate along with verified. Both of these are written by Testkings The idea professionals who are renowned around the entire world.

2021 Dec SY0-401 practice

Q11. Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access? 

A. Registration 

B. CA 

C. CRL 

D. Recovery agent 

Answer:

Explanation: 

Certificates or keys for the terminated employee should be put in the CRL. 

A certificate revocation list (CRL) is created and distributed to all CAs to revoke a certificate or 

key. 

By checking the CRL you can check if a particular certificate has been revoked. 


Q12. Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue and still provide coverage where needed? (Select TWO). 

A. Disable the wired ports 

B. Use channels 1, 4 and 7 only 

C. Enable MAC filtering 

D. Disable SSID broadcast 

E. Switch from 802.11a to 802.11b 

Answer: C,D 

Explanation: Network administrators may choose to disable SSID broadcast to hide their network from unauthorized personnel. However, the SSID is still needed to direct packets to and from the base station, so it’s a discoverable value using a wireless packet sniffer. Thus, the SSID should be disabled if the network isn’t for public use. A MAC filter is a list of authorized wireless client interface MAC addresses that is used by a WAP to block access to all unauthorized devices. 


Q13. Joe, a network administrator, is able to manage the backup software console by using his network login credentials. Which of the following authentication services is he MOST likely using? 

A. SAML 

B. LDAP 

C. iSCSI 

D. Two-factor authentication 

Answer:

Explanation: 


Q14. Which of the following security benefits would be gained by disabling a terminated user account rather than deleting it? 

A. Retention of user keys 

B. Increased logging on access attempts 

C. Retention of user directories and files 

D. Access to quarantined files 

Answer:

Explanation: 

Account Disablement should be implemented when a user will be gone from a company whether they leave temporary or permanently. In the case of permanently leaving the company the account should be disabled. Disablement means that the account will no longer be an active account and that the user keys for that account are retained which would not be the case if the account was deleted from the system. 


Q15. Matt, the Chief Information Security Officer (CISO), tells the network administrator that a security company has been hired to perform a penetration test against his network. The security company asks Matt which type of testing would be most beneficial for him. Which of the following BEST describes what the security company might do during a black box test? 

A. The security company is provided with all network ranges, security devices in place, and logical maps of the network. 

B. The security company is provided with no information about the corporate network or physical locations. 

C. The security company is provided with limited information on the network, including all network diagrams. 

D. The security company is provided with limited information on the network, including some subnet ranges and logical network diagrams. 

Answer:

Explanation: 

The term black box testing is generally associated with application testing. However, in this question the term is used for network testing. Black box testing means testing something when you have no knowledge of the inner workings. 

Black-box testing is a method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied to virtually every level of software testing: unit, integration, system and acceptance. It typically comprises most if not all higher level testing, but can also dominate unit testing as well. Specific knowledge of the application's code/internal structure and programming knowledge in general is not required. The tester is aware of what the software is supposed to do but is not aware of how it does it. For instance, the tester is aware that a particular input returns a certain, invariable output but is not aware of how the software produces the output in the first place. 


Renovate SY0-401 exam price:

Q16. One of the system administrators at a company is assigned to maintain a secure computer lab. The administrator has rights to configure machines, install software, and perform user account maintenance. However, the administrator cannot add new computers to the domain, because that requires authorization from the Information Assurance Officer. This is an example of which of the following? 

A. Mandatory access 

B. Rule-based access control 

C. Least privilege 

D. Job rotation 

Answer:

Explanation: 

A least privilege policy should be used when assigning permissions. Give users only the permissions that they need to do their work and no more. 


Q17. Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile device? 

A. Block cipher 

B. Elliptical curve cryptography 

C. Diffie-Hellman algorithm 

D. Stream cipher 

Answer:

Explanation: 

Regarding the performance of ECC applications on various mobile devices, ECC is the most suitable PKC (Public-key cryptography) scheme for use in a constrained environment. Note: Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography (with plain Galois fields as a basis) is the same level of security provided by keys of smaller size. Using smaller key size would be faster. 


Q18. TION NO: 134 

Which of the following ports is used for SSH, by default? 

A. 23 

B. 32 

C. 12 

D. 22 

Answer:

Explanation: 

Secure Shell (SSH) is a cryptographic network protocol for securing data communication. It establishes a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login, remote command execution, but any network service can be secured with SSH. SSH uses port 22. 


Q19. An administrator needs to secure RADIUS traffic between two servers. Which of the following is the BEST solution? 

A. Require IPSec with AH between the servers 

B. Require the message-authenticator attribute for each message 

C. Use MSCHAPv2 with MPPE instead of PAP 

D. Require a long and complex shared secret for the servers 

Answer:

Explanation: 


Q20. A security technician is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond? 

A. Rule based access control 

B. Role based access control 

C. Discretionary access control 

D. Mandatory access control 

Answer:

Explanation: 

Rule-based access control is used for network devices, such as firewalls and routers, which filter traffic based on filtering rules.