All the CompTIA SY0-401 exam training materials at Pass4sure are obtainable in Pdf forms after purchase. You can download the test engine on your PC to consider the CompTIA SY0-401 simulated tests at home. The CompTIA CompTIA exam demos could be printed and you can practice all of them at your convenience. We guarantee which you will pass the CompTIA SY0-401 exam by employing Pass4sures practice questions and answers. Your questions are logical as well as technical; the answers are accurate as well as verified. Both of them are written by Pass4sures The idea professionals who are popular around the globe.

2021 Dec SY0-401 exams

Q211. Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss to assist in an FM-200 deployment? 

A. Water base sprinkler system 

B. Electrical 

C. HVAC 

D. Video surveillance 

Answer:

Explanation: 

HVAC refers to heating, ventilation and air-conditioning to allow for a zone-based environmental control measure. The fire-alarm system should ideally also be hooked up to the HVAC so that the HVAC can monitor the changes in heating and ventilation. 


Q212. The systems administrator notices that many employees are using passwords that can be easily guessed or are susceptible to brute force attacks. Which of the following would BEST mitigate this risk? 

A. Enforce password rules requiring complexity. 

B. Shorten the maximum life of account passwords. 

C. Increase the minimum password length. 

D. Enforce account lockout policies. 

Answer:

Explanation: 

Password complexity often requires the use of a minimum of three out of four standard character types for a password. The more characters in a password that includes some character complexity, the more resistant it is to brute force attacks. 


Q213. Which of the following technologies uses multiple devices to share work? 

A. Switching 

B. Load balancing 

C. RAID 

D. VPN concentrator 

Answer:

Explanation: 

Load balancing is a way of providing high availability by splitting the workload across multiple computers. 


Q214. A customer service department has a business need to send high volumes of confidential information to customers electronically. All emails go through a DLP scanner. Which of the following is the BEST solution to meet the business needs and protect confidential information? 

A. Automatically encrypt impacted outgoing emails 

B. Automatically encrypt impacted incoming emails 

C. Monitor impacted outgoing emails 

D. Prevent impacted outgoing emails 

Answer:

Explanation: 

Encryption is done to protect confidentiality and integrity of data. It also provides authentication, nonrepudiation and access control to the data. Since all emails go through a DLP scanner and it is outgoing main that requires protection then the best option is to put a system in place that will encrypt the outgoing emails automatically. 


Q215. Users have been reporting that their wireless access point is not functioning. They state that it allows slow connections to the internet, but does not provide access to the internal network. The user provides the SSID and the technician logs into the company’s access point and finds no issues. Which of the following should the technician do? 

A. Change the access point from WPA2 to WEP to determine if the encryption is too strong 

B. Clear all access logs from the AP to provide an up-to-date access list of connected users 

C. Check the MAC address of the AP to which the users are connecting to determine if it is an imposter 

D. Reconfigure the access point so that it is blocking all inbound and outbound traffic as a troubleshooting gap 

Answer:

Explanation: 

The users may be connecting to a rogue access point. The rogue access point could be hosting a wireless network that has the same SSID as the corporate wireless network. The only way to tell for sure if the access point the users are connecting to is the correct one is to check the MAC address. Every network card has a unique 48-bit address assigned. A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi. Logically, MAC addresses are used in the media access control protocol sublayer of the OSI reference model. MAC addresses are most often assigned by the manufacturer of a network interface controller (NIC) and are stored in its hardware, such as the card's read-only memory or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address (BIA). It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. This can be contrasted to a programmed address, where the host device issues commands to the NIC to use an arbitrary address. A network node may have multiple NICs and each NIC must have a unique MAC address. MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. 


Renewal SY0-401 practice exam:

Q216. Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? 

A. Man-in-the-middle 

B. Bluejacking 

C. Bluesnarfing 

D. Packet sniffing 

Answer:

Explanation: 

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters. Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in guerrilla marketing campaigns to promote advergames. 


Q217. Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websites? 

A. 21 

B. 25 

C. 80 

D. 3389 

Answer:

Explanation: 

Port 80 is used by HTTP, which is the foundation of data communication for the World Wide Web. 


Q218. Which of the following concepts allows an organization to group large numbers of servers together in order to deliver a common service? 

A. Clustering 

B. RAID 

C. Backup Redundancy 

D. Cold site 

Answer:

Explanation: 

Anytime you connect multiple computers to work/act together as a single server, it is known as 

clustering. Clustered systems utilize parallel processing (improving performance and availability) 

and add redundancy (but also add costs). 

Clustering is done whenever you connect multiple computers to work and act together as a single 

server. It is meant to utilize parallel processing and can also add to redundancy. 


Q219. Sara, a security engineer, is testing encryption ciphers for performance. Which of the following ciphers offers strong encryption with the FASTEST speed? 

A. 3DES 

B. Blowfish 

C. Serpent 

D. AES256 

Answer:

Explanation: 

Blowfish is an encryption system invented by a team led by Bruce Schneier that performs a 64-bit block cipher at very fast speeds. Blowfish is a fast, except when changing keys. It is a symmetric block cipher that can use variable-length keys (from 32 bits to 448 bits). 


Q220. Used in conjunction, which of the following are PII? (Select TWO). 

A. Marital status 

B. Favorite movie 

C. Pet’s name 

D. Birthday 

E. Full name 

Answer: D,E 

Explanation: 

Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card number, or patient record. A birthday together with a full name makes it personally identifiable information.