Like a CompTIA is regarded as just about the most commonly reputed plus established brands around for just a selection of organizations, these experience are often well worth limited that will other sorts of qualification usually do not bring to your current paycheque. It continues to be announced that will pay raises to get CompTIA SY0-401 professional staff is occasionally over 16% as well as in this specific economic crisis, who wouldn?¡¥t enjoy having enable you to offer an additional deal with alter added onto the end in their paycheque?

2021 Mar SY0-401 test preparation

Q641. Which of the following are examples of network segmentation? (Select TWO). 

A. IDS 

B. IaaS 

C. DMZ 

D. Subnet 

E. IPS 

Answer: C,D 

Explanation: 

C:

 A demilitarized zone (DMZ) is a part of the network that is separated of segmented from the rest of the network by means of firewalls and acts as a buffer between the untrusted public Internet and the trusted local area network (LAN). 

D.

 IP subnets can be used to separate or segment networks while allowing communication between the network segments via routers. 


Q642. Which of the following concepts allows an organization to group large numbers of servers together in order to deliver a common service? 

A. Clustering 

B. RAID 

C. Backup Redundancy 

D. Cold site 

Answer:

Explanation: 

Anytime you connect multiple computers to work/act together as a single server, it is known as 

clustering. Clustered systems utilize parallel processing (improving performance and availability) 

and add redundancy (but also add costs). 

Clustering is done whenever you connect multiple computers to work and act together as a single 

server. It is meant to utilize parallel processing and can also add to redundancy. 


Q643. A small company has a website that provides online customer support. The company requires an account recovery process so that customers who forget their passwords can regain access. 

Which of the following is the BEST approach to implement this process? 

A. Replace passwords with hardware tokens which provide two-factor authentication to the online customer support site. 

B. Require the customer to physically come into the company’s main office so that the customer can be authenticated prior to their password being reset. 

C. Web-based form that identifies customer by another mechanism and then emails the customer their forgotten password. 

D. Web-based form that identifies customer by another mechanism, sets a temporary password and forces a password change upon first login. 

Answer:

Explanation: 

People tend to forget their passwords, thus you should have a password recovery system for them that will not increase risk exposure. Setting a temporary password will restrict the time that the password is valid and thus decrease risk; and in addition forcing the customer to change it upon first login will make the password more secure for the customer. 


Q644. In which of the following scenarios is PKI LEAST hardened? 

A. The CRL is posted to a publicly accessible location. 

B. The recorded time offsets are developed with symmetric keys. 

C. A malicious CA certificate is loaded on all the clients. 

D. All public keys are accessed by an unauthorized user. 

Answer:

Explanation: 

A rogue Certification Authority (CA) certificate allows malicious users to impersonate any Web site on the Internet, including banking and e-commerce sites secured using the HTTPS protocol. A rogue CA certificate would be seen as trusted by Web browsers, and it is harmful because it can appear to be signed by one of the root CAs that browsers trust by default. A rogue Certification Authority (CA) certificate can be created using a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure Web sites. 


Q645. Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network? 

A. Application white listing 

B. Remote wiping 

C. Acceptable use policy 

D. Mobile device management 

Answer:

Explanation: 

Mobile device management (MDM) is allows for managing the mobile devices that employees use to access company resources. MDM is intended to improve security, provide monitoring, enable remote management, and support troubleshooting. It can be used to push or remove applications, manage data, and enforce configuration settings on these devices. 


Improve SY0-401 simulations:

Q646. Which of the following wireless security technologies continuously supplies new keys for WEP? 

A. TKIP 

B. Mac filtering 

C. WPA2 

D. WPA 

Answer:

Explanation: 

TKIP is a suite of algorithms that works as a "wrapper" to WEP, which allows users of legacy WLAN equipment to upgrade to TKIP without replacing hardware. TKIP uses the original WEP programming but "wraps" additional code at the beginning and end to encapsulate and modify it. 


Q647. A software development company has hired a programmer to develop a plug-in module to an existing proprietary application. After completing the module, the developer needs to test the entire application to ensure that the module did not introduce new vulnerabilities. Which of the following is the developer performing when testing the application? 

A. Black box testing 

B. White box testing 

C. Gray box testing 

D. Design review 

Answer:

Explanation: 

In this question, we know the tester has some knowledge of the application because the tester developed a plug-in module for it. However, the tester does not have detailed information about the entire application. Therefore, this is a grey-box test. Gray box testing, also called gray box analysis, is a strategy for software debugging in which the tester has limited knowledge of the internal details of the program. A gray box is a device, program or system whose workings are partially understood. Gray box testing can be contrasted with black box testing, a scenario in which the tester has no knowledge or access to the internal workings of a program, or white box testing, a scenario in which the internal particulars are fully known. Gray box testing is commonly used in penetration tests. Gray box testing is considered to be non-intrusive and unbiased because it does not require that the tester have access to the source code. With respect to internal processes, gray box testing treats a program as a black box that must be analyzed from the outside. During a gray box test, the person may know how the system components interact but not have detailed knowledge about internal program functions and operation. A clear distinction exists between the developer and the tester, thereby minimizing the risk of personnel conflicts. 

Topic 4, Application, Data and Host Security 


Q648. The process of making certain that an entity (operating system, application, etc.) is as secure as it can be is known as: 

A. Stabilizing 

B. Reinforcing 

C. Hardening 

D. Toughening 

Answer:

Explanation: 

Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing unnecessary functions and features, removing unnecessary usernames or logins and disabling unnecessary services. 


Q649. Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches? 

A. DIAMETER 

B. RADIUS 

C. TACACS+ 

D. Kerberos 

Answer:

Explanation: 

TACACS+ is an authentication, authorization, and accounting (AAA) service that makes us of TCP only. 


Q650. CORRECT TEXT 

A security administrator discovers that an attack has been completed against a node on the corporate network. All available logs were collected and stored. 

You must review all network logs to discover the scope of the attack, check the box of the node(s) that have been compromised and drag and drop the appropriate actions to complete the incident response on the network. The environment is a critical production environment; perform the LEAST disruptive actions on the network, while still performing the appropriate incid3nt responses. 

Instructions: The web server, database server, IDS, and User PC are clickable. Check the box of the node(s) that have been compromised and drag and drop the appropriate actions to complete the incident response on the network. Not all actions may be used, and order is not important. If at anytime you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue. 

Answer: Database server was attacked, actions should be to capture network traffic and Chain of Custody.