★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Cause all that matters here is passing the CompTIA comptia sy0 401 exam. Cause all that you need is a high score of comptia security+ study guide sy0 401 CompTIA Security+ Certification exam. The only one thing you need to do is downloading Actualtests sy0 401 vce exam study guides now. We will not let you down with our money-back guarantee.

Q461. A certificate used on an ecommerce web server is about to expire. Which of the following will occur if the certificate is allowed to expire? 

A. The certificate will be added to the Certificate Revocation List (CRL). 

B. Clients will be notified that the certificate is invalid. 

C. The ecommerce site will not function until the certificate is renewed. 

D. The ecommerce site will no longer use encryption. 

Answer:

Explanation: 

A similar process to certificate revocation will occur when a certificate is allowed to expire. Notification will be sent out to clients of the invalid certificate. The process of revoking a certificate begins when the CA is notified that a particular certificate needs to be revoked. This must be done whenever the private key becomes known. The owner of a certificate can request that it be revoked at any time, or the administrator can make the request. 


Q462. Which of the following provides the strongest authentication security on a wireless network? 

A. MAC filter 

B. WPA2 

C. WEP 

D. Disable SSID broadcast 

Answer:

Explanation: 

The Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) authentication protocols were designed to address the core, easy-to-crack problems of WEP. 


Q463. Which of the following controls should critical application servers implement to protect themselves from other potentially compromised application services? 

A. NIPS 

B. Content filter 

C. NIDS 

D. Host-based firewalls 

Answer:

Explanation: 


Q464. The IT department has setup a share point site to be used on the intranet. Security has established the groups and permissions on the site. No one may modify the permissions and all requests for access are centrally managed by the security team. This is an example of which of the following control types? 

A. Rule based access control 

B. Mandatory access control 

C. User assigned privilege 

D. Discretionary access control 

Answer:

Explanation: 

Discretionary access control (DAC) allows access to be granted or restricted by an object’s owner based on user identity and on the discretion of the object owner. 


Q465. In order to use a two-way trust model the security administrator MUST implement which of the following? 

A. DAC 

B. PKI 

C. HTTPS 

D. TPM 

Answer:

Explanation: 

PKI is a high level concept. Within a PKI you use a trust model to set up trust between Certification 

Authorities (CAs). 

A public key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures 

needed to create, manage, distribute, use, store, and revoke digital certificates. 


Q466. A security technician at a small business is worried about the Layer 2 switches in the network suffering from a DoS style attack caused by staff incorrectly cabling network connections between switches. 

Which of the following will BEST mitigate the risk if implemented on the switches? 

A. Spanning tree 

B. Flood guards 

C. Access control lists 

D. Syn flood 

Answer:

Explanation: 

Spanning Tree is designed to eliminate network ‘loops’ from incorrect cabling between switches. Imagine two switches named switch 1 and switch 2 with two network cables connecting the switches. This would cause a network loop. A network loop between two switches can cause a ‘broadcast storm’ where a broadcast packet is sent out of all ports on switch 1 which includes two links to switch 2. The broadcast packet is then sent out of all ports on switch 2 which includes links back to switch 1. The broadcast packet will be sent out of all ports on switch 1 again which includes two links to switch 2 and so on thus flooding the network with broadcast traffic. The Spanning-Tree Protocol (STP) was created to overcome the problems of transparent bridging in redundant networks. The purpose of STP is to avoid and eliminate loops in the network by negotiating a loop-free path through a root bridge. This is done by determining where there are loops in the network and blocking links that are redundant. Spanning-Tree Protocol executes an algorithm called the Spanning-Tree Algorithm (STA). In order to find redundant links, STA will choose a reference point called a Root Bridge, and then determines all the available paths to that reference point. If it finds a redundant path, it chooses for the best path to forward and for all other redundant paths to block. This effectively severs the redundant links within the network. All switches participating in STP gather information on other switches in the network through an exchange of data messages. These messages are referred to as Bridge Protocol Data Units (BPDUs). The exchange of BPDUs in a switched environment will result in the election of a root switch for the stable spanning-tree network topology, election of designated switch for every switched segment, and the removal of loops in the switched network by placing redundant switch ports in a backup state. 


Q467. HOTSPOT 

For each of the given items, select the appropriate authentication category from the dropdown choices. 

Instructions: When you have completed the simu-lation, please select the Done button to submit. 

Answer: 


Q468. Several departments in a corporation have a critical need for routinely moving data from one system to another using removable storage devices. Senior management is concerned with data loss and the introduction of malware on the network. Which of the following choices BEST mitigates the range of risks associated with the continued use of removable storage devices? 

A. Remote wiping enabled for all removable storage devices 

B. Full-disk encryption enabled for all removable storage devices 

C. A well defined acceptable use policy 

D. A policy which details controls on removable storage use 

Answer:

Explanation: 


Q469. A technician is investigating intermittent switch degradation. The issue only seems to occur when the building’s roof air conditioning system runs. Which of the following would reduce the connectivity issues? 

A. Adding a heat deflector 

B. Redundant HVAC systems 

C. Shielding 

D. Add a wireless network 

Answer:

Explanation: 

EMI can cause circuit overload, spikes, or even electrical component failure. In the question it is mentioned that switch degradation occurs when the building’s roof air-conditioning system is also running. All electromechanical systems emanate EMI. Thus you could alleviate the problem using EMI shielding. 


Q470. Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture on a popular social media site together with the message: "Heading to our two weeks vacation to Italy." Upon returning home, Joe discovers that the house was burglarized. Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe’s home address? 

A. Joe has enabled the device access control feature on his mobile phone. 

B. Joe’s home address can be easily found using the TRACEROUTE command. 

C. The picture uploaded to the social media site was geo-tagged by the mobile phone. 

D. The message posted on the social media site informs everyone the house will be empty. 

Answer:

Explanation: 

Geo-tagging is the process of embedding the GPS coordinates in image files and images taken using a smartphone or a digital camera. The geotagged information accompanying the image allows anyone to discover the precise location where the image was taken.