★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


When it comes to CompTIA CompTIA certification exam, the majority of IT aspirants are usually excited but stressed. As the CompTIA SY0-401 certification is their particular dream but they have excellent difficulty in receiving it without any support. If you are the main one who has no thought to prepare for the CompTIA SY0-401 exam, Actualtests.com is the best position you should visit. The CompTIA SY0-401 exam dumps are high-quality along with great important which can guarantee you the passing score. If you prepare for the CompTIA SY0-401 true exam with our own products phase by phase, you will make full achievement. You will be very proud that you just have got the CompTIA CompTIA SY0-401 certification. It can also lay a good foundation on your career within IT planet.

2021 Nov sy0-401 exam:

Q701. Which of the following would BEST deter an attacker trying to brute force 4-digit PIN numbers to access an account at a bank teller machine? 

A. Account expiration settings 

B. Complexity of PIN 

C. Account lockout settings 

D. PIN history requirements 

Answer:

Explanation: 

Account lockout settings determine the number of failed login attempts before the account gets locked and how long the account will be locked out for. For example, an account can be configured to lock if three incorrect passwords (or in this case PIN’s) are entered. The account can then be configured to automatically unlock after a period of time or stay locked until someone manually unlocks it. 


Q702. Certificates are used for: (Select TWO). 

A. Client authentication. 

B. WEP encryption. 

C. Access control lists. 

D. Code signing. 

E. Password hashing. 

Answer: A,D 

Explanation: 

Certificates are used in PKI to digitally sign data, information, files, email, code, etc. Certificates are also used in PKI for client authentication. 


Q703. During a server audit, a security administrator does not notice abnormal activity. However, a network security analyst notices connections to unauthorized ports from outside the corporate network. Using specialized tools, the network security analyst also notices hidden processes running. Which of the following has MOST likely been installed on the server? 

A. SPIM 

B. Backdoor 

C. Logic bomb 

D. Rootkit 

Answer:

Explanation: 

A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a cracker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking a password. Once the rootkit is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and, possibly, other machines on the network. A rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. The presence of a rootkit on a network was first documented in the early 1990s. At that time, Sun and Linux operating systems were the primary targets for a hacker looking to install a rootkit. Today, rootkits are available for a number of operating systems, including Windows, and are increasingly difficult to detect on any network. 


Q704. Which of the following allows an organization to store a sensitive PKI component with a trusted third party? 

A. Trust model 

B. Public Key Infrastructure 

C. Private key 

D. Key escrow 

Answer:

Explanation: 

Sensitive PKI data, such as private keys, can be put into key escrow data. The key escrow data can be kept at a trusted third party. 

Key escrow is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may include businesses, who may want access to employees' private communications, or governments, who may wish to be able to view the contents of encrypted communications. 


Q705. A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer will have very different job requirements and use unique tools and applications in their job. Which of the following is MOST appropriate to use? 

A. Role-based privileges 

B. Credential management 

C. User assigned privileges 

D. User access 

Answer:

Explanation: 


Refresh pdf sy0-401:

Q706. Which of the following protocols encapsulates an IP packet with an additional IP header? 

A. SFTP 

B. IPSec 

C. HTTPS 

D. SSL 

Answer:

Explanation: 

Authentication Header (AH) is a member of the IPsec protocol suite. AH operates directly on top of IP, using IP protocol number 51. 


Q707. A company’s security administrator wants to manage PKI for internal systems to help reduce costs. Which of the following is the FIRST step the security administrator should take? 

A. Install a registration server. 

B. Generate shared public and private keys. 

C. Install a CA 

D. Establish a key escrow policy. 

Answer:

Explanation: 

PKI is a two-key, asymmetric system with four main components: certificate authority (CA), registration authority (RA), RSA (the encryption algorithm), and digital certificates. When you implement a PKI you should start by installing a CA. 


Q708. Which of the following is a security benefit of providing additional HVAC capacity or increased tonnage in a datacenter? 

A. Increased availability of network services due to higher throughput 

B. Longer MTBF of hardware due to lower operating temperatures 

C. Higher data integrity due to more efficient SSD cooling 

D. Longer UPS run time due to increased airflow 

Answer:

Explanation: 

The mean time between failures (MTBF) is the measure of the anticipated incidence of failure for a system or component. This measurement determines the component’s anticipated lifetime. If the MTBF of a cooling system is one year, you can anticipate that the system will last for a one-year period; this means that you should be prepared to replace or rebuild the system once a year. If the system lasts longer than the MTBF, your organization receives a bonus. MTBF is helpful in evaluating a system’s reliability and life expectancy. Thus longer MTBF due to lower operating temperatures is a definite advantage 


Q709. An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire? 

A. Install a proxy server between the users’ computers and the switch to filter inbound network traffic. 

B. Block commonly used ports and forward them to higher and unused port numbers. 

C. Configure the switch to allow only traffic from computers based upon their physical address. 

D. Install host-based intrusion detection software to monitor incoming DHCP Discover requests. 

Answer:

Explanation: 

Configuring the switch to allow only traffic from computers based upon their physical address is known as MAC filtering. The physical address is known as the MAC address. Every network adapter has a unique MAC address hardcoded into the adapter. You can configure the ports of a switch to allow connections from computers with specific MAC addresses only and block all other MAC addresses. MAC filtering is commonly used in wireless networks but is considered insecure because a MAC address can be spoofed. However, in a wired network, it is more secure because it would be more difficult for a rogue computer to sniff a MAC address. 


Q710. After a production outage, which of the following documents contains detailed information on the order in which the system should be restored to service? 

A. Succession planning 

B. Disaster recovery plan 

C. Information security plan 

D. Business impact analysis 

Answer:

Explanation: 

A disaster-recovery plan, or scheme, helps an organization respond effectively when a disaster occurs. Disasters may include system failure, network failure, infrastructure failure, and natural disaster. The primary emphasis of such a plan is reestablishing services and minimizing losses.