CompTIA SY0-401 exam dumps are composed by Actualtestss superb professionals who have quite a lot of expertise in compiling the actual CompTIA SY0-401 exam demos. They are many kinds of CompTIA SY0-401 check questions and answers that can appear from the real check. A lot of candidates have passed the actual CompTIA CompTIA exam since many of us started. Actualtests claims you higher quality and great price which guarantee you any passing score.

2021 Mar SY0-401 test

Q251. A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed? 

A. The request needs to be sent to the incident management team. 

B. The request needs to be approved through the incident management process. 

C. The request needs to be approved through the change management process. 

D. The request needs to be sent to the change management team. 

Answer:

Explanation: 

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. Thus the actual switch configuration should first be subject to the change management approval. 


Q252. Which of the following would a security administrator implement in order to identify change from the standard configuration on a server? 

A. Penetration test 

B. Code review 

C. Baseline review 

D. Design review 

Answer:

Explanation: 

The standard configuration on a server is known as the baseline. 

The IT baseline protection approach is a methodology to identify and implement computer security 

measures in an organization. The aim is the achievement of an adequate and appropriate level of 

security for IT systems. This is known as a baseline. 

A baseline report compares the current status of network systems in terms of security updates, 

performance or other metrics to a predefined set of standards (the baseline). 


Q253. The system administrator has deployed updated security controls for the network to limit risk of attack. The security manager is concerned that controls continue to function as intended to maintain appropriate security posture. 

Which of the following risk mitigation strategies is MOST important to the security manager? 

A. User permissions 

B. Policy enforcement 

C. Routine audits 

D. Change management 

Answer:

Explanation: 

After you have implemented security controls based on risk, you must perform routine audits. These audits should include reviews of user rights and permissions as well as specific events. You should pay particular attention to false positives and negatives. 


Q254. Which of the following is true about the CRL? 

A. It should be kept public 

B. It signs other keys 

C. It must be kept secret 

D. It must be encrypted 

Answer:

Explanation: 

The CRL must be public so that it can be known which keys and certificates have been revoked. In the operation of some cryptosystems, usually public key infrastructures (PKIs), a certificate revocation list (CRL) is a list of certificates (or more specifically, a list of serial numbers for certificates) that have been revoked, and therefore, entities presenting those (revoked) certificates should no longer be trusted. 


Q255. Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company’s password policy. Which of the following should Pete do NEXT? 

A. Contact the Chief Information Officer and ask them to change the company password policy so that the application is made compliant. 

B. Tell the application development manager to code the application to adhere to the company’s password policy. 

C. Ask the application development manager to submit a risk acceptance memo so that the issue can be documented. 

D. Inform the Chief Information Officer of non-adherence to the security policy so that the developers can be reprimanded. 

Answer:

Explanation: 

Since the application is violating the security policy it should be coded differently to comply with the password policy. 


Leading SY0-401 test questions:

Q256. Mike, a user, states that he is receiving several unwanted emails about home loans. Which of the following is this an example of? 

A. Spear phishing 

B. Hoaxes 

C. Spoofing 

D. Spam 

Answer:

Explanation: 

Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally email advertising for some product sent to a mailing list or newsgroup. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers. There is some debate about why it is called spam, but the generally accepted version is that it comes from the Monty Python song, "Spam spam spam spam, spam spam spam spam, lovely spam, wonderful spam". Like the song, spam is an endless repetition of worthless text. Another school of thought maintains that it comes from the computer group lab at the University of Southern California who gave it the name because it has many of the same characteristics as the lunch meat Spam: Nobody wants it or ever asks for it. No one ever eats it; it is the first item to be pushed to the side when eating the entree. Sometimes it is actually tasty, like 1% of junk mail that is really useful to some people. The term spam can also be used to describe any "unwanted" email from a company or website --typically at some point a user would have agreed to receive the email via subscription list opt-in --a newer term called graymail is used to describe this particular type of spam. 


Q257. Which of the following risks could IT management be mitigating by removing an all-in-one device? 

A. Continuity of operations 

B. Input validation 

C. Single point of failure 

D. Single sign on 

Answer:

Explanation: 

The major disadvantage of combining everything into one, although you do this to save costs, is to include a potential single point of failure and the reliance/dependence on a single vendor. 


Q258. Digital Signatures provide which of the following? 

A. Confidentiality 

B. Authorization 

C. Integrity 

D. Authentication 

E. Availability 

Answer:

Explanation: 

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. 


Q259. Which of the following types of encryption will help in protecting files on a PED? 

A. Mobile device encryption 

B. Transport layer encryption 

C. Encrypted hidden container 

D. Database encryption 

Answer:

Explanation: 

Device encryption encrypts the data on a Personal Electronic Device (PED). This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. 


Q260. After Matt, a user enters his username and password at the login screen of a web enabled portal, the following appears on his screen: 

`Please only use letters and numbers on these fields’ 

Which of the following is this an example of? 

A. Proper error handling 

B. Proper input validation 

C. Improper input validation 

D. Improper error handling 

Answer:

Explanation: 

Input validation is an aspect of secure coding and is intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain.