Our CompTIA engineers will always be searching for a method to decipher the latest SY0-401 on the internet questions and answers. It is possible to download the latest SY0-401 puts upon our own Exambible internet site. We all not necessarily just offer SY0-401 pdf exams and also the software program version. Exambible SY0-401 test motor results in a simulator with the environment once the SY0-401 arises, provides a great chance to exercise your CompTIA test communicative environment. Based on your own exam preparation, it is possible to select any SY0-401 version to review overall flexibility. Passing SY0-401 exam can become simpler faster by studying CompTIA SY0-401 exercise exams.

2021 Dec SY0-401 actual exam

Q481. The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity. Which of the following would be MOST effective for preventing this behavior? 

A. Acceptable use policies 

B. Host-based firewalls 

C. Content inspection 

D. Application whitelisting 

Answer:

Explanation: 


Q482. When a new network drop was installed, the cable was run across several fluorescent lights. The users of the new network drop experience intermittent connectivity. Which of the following environmental controls was MOST likely overlooked during installation? 

A. Humidity sensors 

B. EMI shielding 

C. Channel interference 

D. Cable kinking 

Answer:

Explanation: 

Shielding refers to the process of preventing electronic emissions from your computer systems from being used to gather intelligence and preventing outside electronic emissions from disrupting your information-processing abilities. In this case you are experiencing intermittent connectivity since Electro Magnetic Interference (EMI) was not taken into account when running the cables over fluorescent lighting. 


Q483. Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what services and operating systems are running on the corporate network. Which of the following should be used to complete this task? 

A. Fingerprinting and password crackers 

B. Fuzzing and a port scan 

C. Vulnerability scan and fuzzing 

D. Port scan and fingerprinting 

Answer:

Explanation: 

Different services use different ports. When a service is enabled on a computer, a network port is opened for that service. For example, enabling the HTTP service on a web server will open port 80 on the server. By determining which ports are open on a remote server, we can determine which services are running on that server. A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. 

A port scan or portscan can be defined as a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port. While not a nefarious process in and of itself, it is one used by hackers to probe target machine services with the aim of exploiting a known vulnerability of that service. However the majority of uses of a port scan are not attacks and are simple probes to determine services available on a remote machine. 

Fingerprinting is a means of ascertaining the operating system of a remote computer on a network. Fingerprinting is more generally used to detect specific versions of applications or protocols that are run on network servers. Fingerprinting can be accomplished “passively” by sniffing network packets passing between hosts, or it can be accomplished “actively” by transmitting specially created packets to the target machine and analyzing the response 


Q484. Ann, the Chief Technology Officer (CTO), has agreed to allow users to bring their own device (BYOD) in order to leverage mobile technology without providing every user with a company owned device. She is concerned that users may not understand the company's rules, and she wants to limit potential legal concerns. Which of the following is the CTO concerned with? 

A. Data ownership 

B. Device access control 

C. Support ownership 

D. Acceptable use 

Answer:

Explanation: 


Q485. A company would like to take electronic orders from a partner; however, they are concerned that a non-authorized person may send an order. The legal department asks if there is a solution that provides non-repudiation. Which of the following would meet the requirements of this scenario? 

A. Encryption 

B. Digital signatures 

C. Steganography 

D. Hashing 

E. Perfect forward secrecy 

Answer:

Explanation: 


Updated SY0-401 exam question:

Q486. The public key is used to perform which of the following? (Select THREE). 

A. Validate the CRL 

B. Validate the identity of an email sender 

C. Encrypt messages 

D. Perform key recovery 

E. Decrypt messages 

F. Perform key escrow 

Answer: B,C,E 

Explanation: 

B: The sender uses the private key to create a digital signature. The message is, in effect, signed 

with the private key. The sender then sends the message to the receiver. The receiver uses the 

public key attached to the message to validate the digital signature. If the values match, the 

receiver knows the message is authentic. 

C: The sender uses the public key to encrypt a message, and the receiver uses the private key to 

decrypt the message. 

E: You encrypt data with the private key and decrypt with the public key, though the opposite is 

much more frequent. 

Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic 

protocols based on algorithms that require two separate keys, one of which is secret (or private) 

and one of which is public. Although different, the two parts of this key pair are mathematically 

linked. 


Q487. A victim is logged onto a popular home router forum site in order to troubleshoot some router configuration issues. The router is a fairly standard configuration and has an IP address of 

192.168.1.1. The victim is logged into their router administrative interface in one tab and clicks a forum link in another tab. Due to clicking the forum link, the home router reboots. Which of the following attacks MOST likely occurred? 

A. Brute force password attack 

B. Cross-site request forgery 

C. Cross-site scripting 

D. Fuzzing 

Answer:

Explanation: 

Cross-Site Request Forgery—also known as XSRF, session riding, and one-click attack—involves unauthorized commands coming from a trusted user to the website. This is often done without the user’s knowledge, and it employs some type of social networking to pull it off. For example, assume that Evan and Spencer are chatting through Facebook. Spencer sends Evan a link to what he purports is a funny video that will crack him up. Evan clicks the link, but it actually brings up Evan’s bank account information in another browser tab, takes a screenshot of it, closes the tab, and sends the information to Spencer. The reason the attack is possible is because Evan is a trusted user with his own bank. In order for it to work, Evan would need to have recently accessed that bank’s website and have a cookie that had yet to expire. The best protection against cross-site scripting is to disable the running of scripts (and browser profi les). 


Q488. A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389 are in a 'listening' state. No other ports are open. Which of the following services should be disabled to ensure secure communications? 

A. HTTPS 

B. HTTP 

C. RDP 

D. TELNET 

Answer:

Explanation: 


Q489. A security administrator must implement a secure key exchange protocol that will allow company clients to autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the following MUST be implemented? 

A. SHA-256 

B. AES 

C. Diffie-Hellman 

D. 3DES 

Answer:

Explanation: 


Q490. A customer service department has a business need to send high volumes of confidential information to customers electronically. All emails go through a DLP scanner. Which of the following is the BEST solution to meet the business needs and protect confidential information? 

A. Automatically encrypt impacted outgoing emails 

B. Automatically encrypt impacted incoming emails 

C. Monitor impacted outgoing emails 

D. Prevent impacted outgoing emails 

Answer:

Explanation: 

Encryption is done to protect confidentiality and integrity of data. It also provides authentication, nonrepudiation and access control to the data. Since all emails go through a DLP scanner and it is outgoing main that requires protection then the best option is to put a system in place that will encrypt the outgoing emails automatically.