Ucertify enactment associated with ?¡ãa 100 % refund?¡À commitment. Should you buy some of our SY0-401 review, would not move the very first test, together with the handle or simply VUE test out stores own PROMETRIC Complience seal test record minute card, we will repayment the entire tariff of your purchase review, the absolute assure that your pursuits will not be almost any decrease in. Ucertify SY0-401 review resources would be the fantastic combined the initial title, coverage associated with 96% or higher.

2021 Dec SY0-401 exam topics

Q31. A quality assurance analyst is reviewing a new software product for security, and has complete access to the code and data structures used by the developers. This is an example of which of the following types of testing? 

A. Black box 

B. Penetration 

C. Gray box 

D. White box 

Answer:

Explanation: 

White box testing is the process of testing an application when you have detailed knowledge of the inner workings of the application. White-box testing (also known as clear box testing, glass box testing, transparent box testing, and structural testing) is a method of testing software that tests internal structures or workings of an application, as opposed to its functionality (i.e. black-box testing). In white-box testing an internal perspective of the system, as well as programming skills, are used to design test cases. The tester chooses inputs to exercise paths through the code and determine the appropriate outputs. This is analogous to testing nodes in a circuit, e.g. in-circuit testing (ICT). White-box testing can be applied at the unit, integration and system levels of the software testing process. Although traditional testers tended to think of white-box testing as being done at the unit level, it is used for integration and system testing more frequently today. It can test paths within a unit, paths between units during integration, and between subsystems during a system–level test. 


Q32. Which of the following types of trust models is used by a PKI? 

A. Transitive 

B. Open source 

C. Decentralized 

D. Centralized 

Answer:

Explanation: 

PKI uses a centralized trust model. In a simple PKI a single centralized certification authority (CA). 

In a hierarchical trust model the root CA is the center of the model, with subordinate CAs lower in 

the hierarchy. 

Note: A public key infrastructure (PKI) is a set of hardware, software, people, policies, and 

procedures needed to create, manage, distribute, use, store, and revoke digital certificates. 

A trust Model is collection of rules that informs application on how to decide the legitimacy of a 

Digital Certificate. 

Topic 7 


Q33. A recent audit of a company’s identity management system shows that 30% of active accounts belong to people no longer with the firm. Which of the following should be performed to help avoid this scenario? (Select TWO). 

A. Automatically disable accounts that have not been utilized for at least 10 days. 

B. Utilize automated provisioning and de-provisioning processes where possible. 

C. Request that employees provide a list of systems that they have access to prior to leaving the firm. 

D. Perform regular user account review / revalidation process. 

E. Implement a process where new account creations require management approval. 

Answer: B,D 

Explanation: 

Provisioning and de-provisioning processes can occur manually or automatically. Since the manual processes are so time consuming, the automated option should be used as it is more efficient. Revalidating user accounts would determine which users are no longer active. 


Q34. An administrator finds that non-production servers are being frequently compromised, production servers are rebooting at unplanned times and kernel versions are several releases behind the version with all current security fixes. 

Which of the following should the administrator implement? 

A. Snapshots 

B. Sandboxing 

C. Patch management 

D. Intrusion detection system 

Answer:

Explanation: 

Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps protect a systems from newly discovered attacks and vulnerabilities. 


Q35. Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles during the week. Further investigation by the system engineering team determined that a timed .exe file had been uploaded to the system control console during a visit by international contractors. Which of the following actions should Joe recommend? 

A. Create a VLAN for the SCADA 

B. Enable PKI for the MainFrame 

C. Implement patch management 

D. Implement stronger WPA2 Wireless 

Answer:

Explanation: 

VLANs are used for traffic management. VLANs can be used to isolate traffic between network segments. This can be accomplished by not defining a route between different VLANs or by specifying a deny filter between certain VLANs (or certain members of a VLAN). Any network segment that doesn’t need to communicate with another in order to accomplish a work task/function shouldn’t be able to do so. 


Up to the minute SY0-401 test question:

Q36. A security administrator wants to test the reliability of an application which accepts user provided parameters. The administrator is concerned with data integrity and availability. Which of the following should be implemented to accomplish this task? 

A. Secure coding 

B. Fuzzing 

C. Exception handling 

D. Input validation 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Q37. An administrator was asked to review user accounts. Which of the following has the potential to cause the MOST amount of damage if the account was compromised? 

A. A password that has not changed in 180 days 

B. A single account shared by multiple users 

C. A user account with administrative rights 

D. An account that has not been logged into since creation 

Answer:

Explanation: 


Q38. Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss? 

A. Record time offset 

B. Clean desk policy 

C. Cloud computing 

D. Routine log review 

Answer:

Explanation: 

Clean Desk Policy Information on a desk—in terms of printouts, pads of note paper, sticky notes, and the like—can be easily seen by prying eyes and taken by thieving hands. To protect data and your business, encourage employees to maintain clean desks and to leave out only those papers that are relevant to the project they are working on at that moment. All sensitive information should be put away when the employee is away from their desk. This will mitigate the risk of data loss when applied. 


Q39. A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security controls? 

A. Integrity 

B. Availability 

C. Confidentiality 

D. Safety 

Answer:

Explanation: 

Fencing is used to increase physical security and safety. Locks are used to keep those who are unauthorized out. 


Q40. Configuring the mode, encryption methods, and security associations are part of which of the following? 

A. IPSec 

B. Full disk encryption 

C. 802.1x 

D. PKI 

Answer:

Explanation: 

IPSec can operate in tunnel mode or transport mode. It uses symmetric cryptography to provide encryption security. Furthermore, it makes use of Internet Security Association and Key Management Protocol (ISAKMP).