★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


The Actualtests CompTIA SY0-401 on-line schooling staff in addition fit energy directly into establishing three additional techniques of schooling equally on-line, and real world. Incorporating the actual Actualtests SY0-401 review issues with a SY0-401 investigation guidebook, SY0-401, SY0-401 songs review or maybe a labratory and scenarios while on the market, could additionally cement your knowledge and get you prepared for your current CompTIA SY0-401 review and more than.

2021 Aug sy0-301 or sy0-401:

Q741. A security technician is attempting to improve the overall security posture of an internal mail server. Which of the following actions would BEST accomplish this goal? 

A. Monitoring event logs daily 

B. Disabling unnecessary services 

C. Deploying a content filter on the network 

D. Deploy an IDS on the network 

Answer: B 

Explanation: 

One of the most basic practices for reducing the attack surface of a specific host is to disable unnecessary services. Services running on a host, especially network services provide an avenue through which the system can be attacked. If a service is not being used, disable it. 


Q742. Which of the following would prevent a user from installing a program on a company-owned mobile device? 

A. White-listing 

B. Access control lists 

C. Geotagging 

D. Remote wipe 

Answer: A 

Explanation: 

Application whitelisting is a form of application security which prevents any software from running on a system unless it is included on a preapproved exception list. 


Q743. The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO). 

A. Device encryption 

B. Antivirus 

C. Privacy screen 

D. Cable locks 

E. Remote wipe 

Answer: B,D 

Explanation: 

B: Antivirus software is used to protect systems against viruses, which are a form of malicious code designed to spread from one system to another, consuming network resources. Public systems are particularly prone to viruses. 

D: Cable locks are theft deterrent devices that can be used to tether a device to a fixed point keep devices from being easy to steal. 


Q744. Disabling unnecessary services, restricting administrative access, and enabling auditing controls on a server are forms of which of the following? 

A. Application patch management 

B. Cross-site scripting prevention 

C. Creating a security baseline 

D. System hardening 

Answer: D 

Explanation: 

Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing or disabling unnecessary functions and features, removing or disabling unnecessary user accounts, disabling unnecessary protocols and ports, and disabling unnecessary services. 


Q745. A software company has completed a security assessment. The assessment states that the company should implement fencing and lighting around the property. Additionally, the assessment states that production releases of their software should be digitally signed. Given the recommendations, the company was deficient in which of the following core security areas? (Select TWO). 

A. Fault tolerance 

B. Encryption 

C. Availability 

D. Integrity 

E. Safety 

F. Confidentiality 

Answer: D,E 

Explanation: 

Aspects such as fencing, proper lighting, locks, CCTV, Escape plans Drills, escape routes and 

testing controls form part of safety controls. 

Integrity refers to aspects such as hashing, digital signatures, certificates and non-repudiation – all 

of which has to do with data integrity. 


SY0-401 brain dumps

Far out actualtests sy0-401:

Q746. A review of the company’s network traffic shows that most of the malware infections are caused by users visiting gambling and gaming websites. The security manager wants to implement a solution that will block these websites, scan all web traffic for signs of malware, and block the malware before it enters the company network. Which of the following is suited for this purpose? 

A. ACL 

B. IDS 

C. UTM 

D. Firewall 

Answer: C 

Explanation: 

An all-in-one appliance, also known as Unified Threat Management (UTM) and Next Generation Firewall (NGFW), is one that provides a good foundation for security. A variety is available; those that you should be familiar with for the exam fall under the categories of providing URL filtering, content inspection, or malware inspection. 

Malware inspection is the use of a malware scanner to detect unwanted software content in network traffic. If malware is detected, it can be blocked or logged and/or trigger an alert. 


Q747. A security specialist has been asked to evaluate a corporate network by performing a vulnerability assessment. Which of the following will MOST likely be performed? 

A. Identify vulnerabilities, check applicability of vulnerabilities by passively testing security controls. 

B. Verify vulnerabilities exist, bypass security controls and exploit the vulnerabilities. 

C. Exploit security controls to determine vulnerabilities and misconfigurations. 

D. Bypass security controls and identify applicability of vulnerabilities by passively testing security controls. 

Answer: A 

Explanation: 

We need to determine if vulnerabilities exist by passively testing security controls. A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Internet in order to assess the threat of rogue software or malicious employees in an enterprise. 


Q748. Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended? 

A. Screen lock 

B. Voice encryption 

C. GPS tracking 

D. Device encryption 

Answer: A 

Explanation: 

Screen-lock is a security feature that requires the user to enter a PIN or a password after a short period of inactivity before they can access the system again. This feature ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications. 


Q749. Which of the following should Joe, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from his company? 

A. Privacy Policy 

B. Least Privilege 

C. Acceptable Use 

D. Mandatory Vacations 

Answer: D 

Explanation: 

When one person fills in for another, such as for mandatory vacations, it provides an opportunity to see what the person is doing and potentially uncover any fraud. 


Q750. Which of the following is the below pseudo-code an example of? 

IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT 

A. Buffer overflow prevention 

B. Input validation 

C. CSRF prevention 

D. Cross-site scripting prevention 

Answer: B 

Explanation: 

Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain.