By generating the utmost involving our CompTIA SY0-401 goods which contain SY0-401 exam question and answers, you are bond to obtain through the CompTIA actual test. All of us guarantee your current success together with the help involving CompTIA SY0-401 professionally written practice questions and answers at Actualtests. Each of our CompTIA practice materials gives you comprehensive education for the SY0-401 exam syllabus. Cracking the particular CompTIA CompTIA exam is no issue with each of our precise, accurate and logical dumps. The feedback and high passing ratio may prove each of our promise. All of us offer you the money-back policy just in case you fail in the initial attempt after utilizing CompTIA SY0-401 products.

2021 Feb SY0-401 free exam

Q661. Which of the following BEST represents the goal of a vulnerability assessment? 

A. To test how a system reacts to known threats 

B. To reduce the likelihood of exploitation 

C. To determine the system’s security posture 

D. To analyze risk mitigation strategies 

Answer:

Explanation: 

A vulnerability scan is the process of scanning the network and/or I.T. infrastructure for threats and vulnerabilities. The threats and vulnerabilities are then evaluated in a risk assessment and the necessary actions taken to resolve and vulnerabilities. A vulnerability scan scans for known weaknesses such as missing patches or security updates. 

A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. 


Q662. A system security analyst using an enterprise monitoring tool notices an unknown internal host exfiltrating files to several foreign IP addresses. Which of the following would be an appropriate mitigation technique? 

A. Disabling unnecessary accounts 

B. Rogue machine detection 

C. Encrypting sensitive files 

D. Implementing antivirus 

Answer:

Explanation: 

Rogue machine detection is the process of detecting devices on the network that should not be there. If a user brings in a laptop and plugs it into the network, the laptop is a “rogue machine”. The laptop could cause problems on the network. Any device on the network that should not be there is classed as rogue. 


Q663. After an audit, it was discovered that the security group memberships were not properly adjusted for employees’ accounts when they moved from one role to another. Which of the following has the organization failed to properly implement? (Select TWO). 

A. Mandatory access control enforcement. 

B. User rights and permission reviews. 

C. Technical controls over account management. 

D. Account termination procedures. 

E. Management controls over account management. 

F. Incident management and response plan. 

Answer: B,E 

Explanation: 

Reviewing user rights and permissions can be used to determine that all groups, users, and other accounts have the appropriate privileges assigned according to the policies of the corporation and their job descriptions since they were all moved to different roles. Control over account management would have taken into account the different roles that employees have and adjusted the rights and permissions of these roles accordingly. 


Q664. A company’s legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO). 

A. IPv6 

B. SFTP 

C. IPSec 

D. SSH 

E. IPv4 

Answer: A,C 

Explanation: 

Telnet supports IPv6 connections. IPv6 is the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPsec is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec is a compulsory component for IPv6. 

IPsec operates at Layer 3 of the OSI model, whereas Telnet operates at Layer 7. 


Q665. Which of the following should be enabled in a laptop’s BIOS prior to full disk encryption? 

A. USB 

B. HSM 

C. RAID 

D. TPM 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Refresh SY0-401 rapidshare:

Q666. A security administrator develops a web page and limits input into the fields on the web page as well as filters special characters in output. The administrator is trying to prevent which of the following attacks? 

A. Spoofing 

B. XSS 

C. Fuzzing 

D. Pharming 

Answer:

Explanation: 

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users. Cross-site scripting uses known vulnerabilities in web-based applications, their servers, or plug-in systems on which they rely. Exploiting one of these, attackers fold malicious content into the content being delivered from the compromised site. When the resulting combined content arrives at the client-side web browser, it has all been delivered from the trusted source, and thus operates under the permissions granted to that system. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access-privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. 

By validating user input and preventing special characters, we can prevent the injection of client-side scripting code. 


Q667. ON NO: 50 

The Human Resources department has a parent shared folder setup on the server. There are two groups that have access, one called managers and one called staff. There are many sub folders under the parent shared folder, one is called payroll. The parent folder access control list propagates all subfolders and all subfolders inherit the parent permission. Which of the following is the quickest way to prevent the staff group from gaining access to the payroll folder? 

A. Remove the staff group from the payroll folder 

B. Implicit deny on the payroll folder for the staff group 

C. Implicit deny on the payroll folder for the managers group 

D. Remove inheritance from the payroll folder 

Answer:

Explanation: Implicit deny is the default security stance that says if you aren’t specifically granted access or privileges for a resource, you’re denied access by default. 


Q668. Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE). 

A. Spam filter 

B. Load balancer 

C. Antivirus 

D. Proxies 

E. Firewall 

F. NIDS 

G. URL filtering 

Answer: D,E,G 

Explanation: 

A proxy server is a server that acts as an intermediary for requests from clients seeking resources 

from other servers. 

Firewalls manage traffic using a rule or a set of rules. 

A URL is a reference to a resource that specifies the location of the resource. A URL filter is used 

to block access to a site based on all or part of a URL. 


Q669. Due to limited resources, a company must reduce their hardware budget while still maintaining availability. Which of the following would MOST likely help them achieve their objectives? 

A. Virtualization 

B. Remote access 

C. Network access control 

D. Blade servers 

Answer:

Explanation: 

Because Virtualization allows a single set of hardware to host multiple virtual machines, it requires less hardware to maintain the current scenario. 


Q670. During an anonymous penetration test, Jane, a system administrator, was able to identify a shared print spool directory, and was able to download a document from the spool. Which statement BEST describes her privileges? 

A. All users have write access to the directory. 

B. Jane has read access to the file. 

C. All users have read access to the file. 

D. Jane has read access to the directory. 

Answer:

Explanation: 

The question states that Jane was able to download a document from the spool directory. To view and download the document, Jane must have at least Read access to the file. The fact that the document belonged to someone else suggests that all users have read access to the file.