★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


In fact, several candidates have passed the CompTIA CompTIA exam soon after purchasing the products. So, its a wise choice for you personally to take portion in the SY0-401 on-line training. You will get complete refund if you dont obtain the expected mark. Many of us promise anyone almost 100% ensure success. Employing our CompTIA certification practice check, your self-confidence and proficiency will be enhanced; your own knowledge will likely be strengthened. The CompTIA SY0-401 genuine exam will be within just your grasp very before long after anyone taking the particular CompTIA SY0-401 dumps.

2021 Mar SY0-401 exam cost

Q221. The security manager received a report that an employee was involved in illegal activity and has saved data to a workstation’s hard drive. During the investigation, local law enforcement’s criminal division confiscates the hard drive as evidence. Which of the following forensic procedures is involved? 

A. Chain of custody 

B. System image 

C. Take hashes 

D. Order of volatility 

Answer:

Explanation: 

Chain of custody deals with how evidence is secured, where it is stored, and who has access to it. When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. 


Q222. A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication and the files the user is sending using only a user ID and a key pair. Which of the following methods would achieve this goal? 

A. AES 

B. IPSec 

C. PGP 

D. SSH 

Answer:

Explanation: 


Q223. Which of the following can be implemented if a security administrator wants only certain devices connecting to the wireless network? 

A. Disable SSID broadcast 

B. Install a RADIUS server 

C. Enable MAC filtering 

D. Lowering power levels on the AP 

Answer:

Explanation: 

MAC filtering is commonly used in wireless networks. In computer networking, MAC Filtering (or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network. 


Q224. Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following? 

A. Acceptable Use Policy 

B. Physical security controls 

C. Technical controls 

D. Security awareness training 

Answer:

Explanation: 

Security awareness and training include explaining policies, procedures, and current threats to both users and management. A security awareness and training program can do much to assist in your efforts to improve and maintain security. A good security awareness training program for the entire organization should cover the following areas: Importance of security; Responsibilities of people in the organization; Policies and procedures; Usage policies; Account and password-selection criteria as well as Social engineering prevention. 


Q225.  

Which of the following would be MOST appropriate if an organization's requirements mandate complete control over the data and applications stored in the cloud? 

A. Hybrid cloud 

B. Community cloud 

C. Private cloud 

D. Public cloud 

Answer:

Explanation: 


Down to date SY0-401 simulations:

Q226. Joe Has read and write access to his own home directory. Joe and Ann are collaborating on a project, and Joe would like to give Ann write access to one particular file in this home directory. Which of the following types of access control would this reflect? 

A. Role-based access control 

B. Rule-based access control 

C. Mandatory access control 

D. Discretionary access control 

Answer:

Explanation: 

Discretionary access control (DAC) allows access to be granted or restricted by an object’s owner based on user identity and on the discretion of the object owner. 


Q227. A recent review of accounts on various systems has found that after employees' passwords are required to change they are recycling the same password as before. Which of the following policies should be enforced to prevent this from happening? (Select TWO). 

A. Reverse encryption 

B. Minimum password age 

C. Password complexity 

D. Account lockouts 

E. Password history 

F. Password expiration 

Answer: B,E 

Explanation: 


Q228. A security analyst needs to ensure all external traffic is able to access the company’s front-end servers but protect all access to internal resources. Which of the following network design elements would MOST likely be recommended? 

A. DMZ 

B. Cloud computing 

C. VLAN 

D. Virtualization 

Answer:

Explanation: 

A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall. 


Q229. A company has recently allowed employees to take advantage of BYOD by installing WAPs throughout the corporate office. An employee, Joe, has recently begun to view inappropriate material at work using his personal laptop. When confronted, Joe indicated that he was never told that he could not view that type of material on his personal laptop. Which of the following should the company have employees acknowledge before allowing them to access the corporate WLAN with their personal devices? 

A. Privacy Policy 

B. Security Policy 

C. Consent to Monitoring Policy 

D. Acceptable Use Policy 

Answer:

Explanation: 


Q230. Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT group, to edit a file. Currently, the file has the following permissions: Ann: read/write 

Sales Group: read 

IT Group: no access 

If a discretionary access control list is in place for the files owned by Ann, which of the following would be the BEST way to share the file with Joe? 

A. Add Joe to the Sales group. 

B. Have the system administrator give Joe full access to the file. 

C. Give Joe the appropriate access to the file directly. 

D. Remove Joe from the IT group and add him to the Sales group. 

Answer:

Explanation: