★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Choose Actualtests SY0-401 and also obtain SY0-401 examination questions to get the SY0-401 quiz accreditation. Actualtests SY0-401 apply issues were created by using issues, as well as highly accurate, plausible and also proved answers. Some of our SY0-401 apply quiz will give you some sort of examining practical experience unparalleled. Some of our SY0-401 apply examination issues and also SY0-401 are listening to advice from present and also lively Information Technology pros who apply their own experience in preparing anyone competent money for hard times.

2021 Apr SY0-401 practice

Q681. An online store wants to protect user credentials and credit card information so that customers can store their credit card information and use their card for multiple separate transactions. 

Which of the following database designs provides the BEST security for the online store? 

A. Use encryption for the credential fields and hash the credit card field 

B. Encrypt the username and hash the password 

C. Hash the credential fields and use encryption for the credit card field 

D. Hash both the credential fields and the credit card field 

Answer:

Explanation: 

Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash tables. One main characteristic of hashing is that the algorithm must have few or no collisions – in hashing two different inputs does not give the same output. Thus the credential fields should be hashed because anyone customer will have a unique credit card number/identity and since they will use their credit cards for many different transactions, the credit card field should be encrypted only, not hashed. 


Q682. A program has been discovered that infects a critical Windows system executable and stays dormant in memory. When a Windows mobile phone is connected to the host, the program infects the phone’s boot loader and continues to target additional Windows PCs or phones. Which of the following malware categories BEST describes this program? 

A. Zero-day 

B. Trojan 

C. Virus 

D. Rootkit 

Answer:

Explanation: 

A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs. 


Q683. Pete, the system administrator, has concerns regarding users losing their company provided smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his concerns? 

A. Enforce device passwords. 

B. Use remote sanitation. 

C. Enable GPS tracking. 

D. Encrypt stored data. 

Answer:

Explanation: 

Global Positioning System (GPS) tracking can be used to identify its location of a stolen device and can allow authorities to recover the device. However, for GPS tracking to work, the device must have an Internet connection or a wireless phone service over which to send its location information. 


Q684. Certificates are used for: (Select TWO). 

A. Client authentication. 

B. WEP encryption. 

C. Access control lists. 

D. Code signing. 

E. Password hashing. 

Answer: A,D 

Explanation: 

Certificates are used in PKI to digitally sign data, information, files, email, code, etc. Certificates are also used in PKI for client authentication. 


Renew SY0-401 free practice test:

Q685. Which of the following identifies certificates that have been compromised or suspected of being compromised? 

A. Certificate revocation list 

B. Access control list 

C. Key escrow registry 

D. Certificate authority 

Answer:

Explanation: 

Certificates that have been compromised or are suspected of being compromised are revoked. A CRL is a locally stored record containing revoked certificates and revoked keys. 


Q686. A recent spike in virus detections has been attributed to end-users visiting www.compnay.com. The business has an established relationship with an organization using the URL of www.company.com but not with the site that has been causing the infections. Which of the following would BEST describe this type of attack? 

A. Typo squatting 

B. Session hijacking 

C. Cross-site scripting 

D. Spear phishing 

Answer:

Explanation: 

Typosquatting, also called URL hijacking or fake url, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typographical errors made by Internet users when inputting a website address into a web browser. Should a user accidentally enter an incorrect website address, they may be led to any URL (including an alternative website owned by a cybersquatter). 

The typosquatter's URL will usually be one of four kinds, all similar to the victim site address: (In the following, the intended website is "example.com") 

.

A common misspelling, or foreign language spelling, of the intended site: exemple.com 

.

A misspelling based on typing errors: xample.com or examlpe.com 

.

A differently phrased domain name: examples.com 

.

A different top-level domain: example.org Once in the typosquatter's site, the user may also be tricked into thinking that they are in fact in the real site; through the use of copied or similar logos, website layouts or content. 


Q687. It has been discovered that students are using kiosk tablets intended for registration and scheduling to play games and utilize instant messaging. Which of the following could BEST eliminate this issue? 

A. Device encryption 

B. Application control 

C. Content filtering 

D. Screen-locks 

Answer:

Explanation: 


Q688. Due to issues with building keys being duplicated and distributed, a security administrator wishes to change to a different security control regarding a restricted area. The goal is to provide access based upon facial recognition. Which of the following will address this requirement? 

A. Set up mantraps to avoid tailgating of approved users. 

B. Place a guard at the entrance to approve access. 

C. Install a fingerprint scanner at the entrance. 

D. Implement proximity readers to scan users’ badges. 

Answer:

Explanation: 

A guard can be instructed to deny access until authentication has occurred will address the situation adequately. 


Q689. A security technician is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond? 

A. Rule based access control 

B. Role based access control 

C. Discretionary access control 

D. Mandatory access control 

Answer:

Explanation: 

Rule-based access control is used for network devices, such as firewalls and routers, which filter traffic based on filtering rules.