Proper study guides for Renewal CompTIA CompTIA Security+ Certification certified begins with CompTIA SY0-401 preparation products which designed to deliver the Highest Quality SY0-401 questions by making you pass the SY0-401 test at your first time. Try the free SY0-401 demo right now.

2021 Jan SY0-401 free download

Q431. A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue? 

A. The SSID broadcast is disabled. 

B. The company is using the wrong antenna type. 

C. The MAC filtering is disabled on the access point. 

D. The company is not using strong enough encryption. 

Answer:

Explanation: 

When the SSID is broadcast, any device with an automatic detect and connect feature is able to see the network and can initiate a connection with it. The fact that they cannot access the network means that they are unable to see it. 


Q432. After an assessment, auditors recommended that an application hosting company should contract with additional data providers for redundant high speed Internet connections. Which of the following is MOST likely the reason for this recommendation? (Select TWO). 

A. To allow load balancing for cloud support 

B. To allow for business continuity if one provider goes out of business 

C. To eliminate a single point of failure 

D. To allow for a hot site in case of disaster 

E. To improve intranet communication speeds 

Answer: B,C 

Explanation: 

A high-speed internet connection to a second data provider could be used to keep an up-to-date replicate of the main site. In case of problem on the first site, operation can quickly switch to the second site. This eliminates the single point of failure and allows the business to continue uninterrupted on the second site. Note: Recovery Time Objective The recovery time objective (RTO) is the maximum amount of time that a process or service is allowed to be down and the consequences still be considered acceptable. Beyond this time, the break in business continuity is considered to affect the business negatively. The RTO is agreed on during BIA creation. 


Q433. Which device monitors network traffic in a passive manner? 

A. Sniffer 

B. IDS 

C. Firewall 

D. Web browser 

Answer:

Explanation: 

A sniffer is another name for a protocol analyzer. A protocol analyzer performs its function in a 

passive manner. In other words, computers on the network do not know that their data packets 

have been captured. 

A Protocol Analyzer is a hardware device or more commonly a software program used to capture 

network data communications sent between devices on a network. Capturing packets sent from a 

computer system is known as packet sniffing. 

Well known software protocol analyzers include Message Analyzer (formerly Network Monitor) 

from Microsoft and Wireshark (formerly Ethereal). 

A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If computers are 

connected to a local area network that is not filtered or switched, the traffic can be broadcast to all 

computers contained in the same segment. This doesn’t generally occur, since computers are 

generally told to ignore all the comings and goings of traffic from other computers. However, in the 

case of a sniffer, all traffic is shared when the sniffer software commands the Network Interface 

Card (NIC) to stop ignoring the traffic. The NIC is put into promiscuous mode, and it reads 

communications between computers within a particular segment. This allows the sniffer to seize everything that is flowing in the network, which can lead to the unauthorized access of sensitive data. A packet sniffer can take the form of either a hardware or software solution. A sniffer is also known as a packet analyzer. 


Q434. Which of the following authentication services should be replaced with a more secure alternative? 

A. RADIUS 

B. TACACS 

C. TACACS+ 

D. XTACACS 

Answer:

Explanation: 

Terminal Access Controller Access-Control System (TACACS) is less secure than XTACACS, which is a proprietary extension of TACACS, and less secure than TACACS+, which replaced TACACS and XTACACS. 


Q435. Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information. Which of the following will accomplish this task securely? 

A. Digital Signatures 

B. Hashing 

C. Secret Key 

D. Encryption 

Answer:

Explanation: 

Encryption is used to prevent unauthorized users from accessing data. Data encryption will support the confidentiality of the email. 


Regenerate SY0-401 test question:

Q436. Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privilege principles? 

A. User rights reviews 

B. Incident management 

C. Risk based controls 

D. Annual loss expectancy 

Answer:

Explanation: 

A least privilege policy should be used when assigning permissions. Give users only the permissions and rights that they need to do their work and no more. 


Q437. Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives? 

A. Degaussing 

B. Physical Destruction 

C. Lock up hard drives in a secure safe 

D. Wipe 

Answer:

Explanation: 

The physical description of hard drives is the only secure means of disposing hard drives. This can include incineration, an acid bath, and crushing. 


Q438. Which of the following is a best practice when securing a switch from physical access? 

A. Disable unnecessary accounts 

B. Print baseline configuration 

C. Enable access lists 

D. Disable unused ports 

Answer:

Explanation: 

Disabling unused switch ports a simple method many network administrators use to help secure their network from unauthorized access. 

All ports not in use should be disabled. Otherwise, they present an open door for an attacker to enter. 


Q439. Visible security cameras are considered to be which of the following types of security controls? 

A. Technical 

B. Compensating 

C. Deterrent 

D. Administrative 

Answer:

Explanation: 


Q440. When reviewing a digital certificate for accuracy, which of the following would Matt, a security administrator, focus on to determine who affirms the identity of the certificate owner? 

A. Trust models 

B. CRL 

C. CA 

D. Recovery agent 

Answer:

Explanation: 

A certificate authority (CA) is an organization that is responsible for issuing, revoking, and distributing certificates. The CA affirms the identity of the certificate owner.