★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Research the official certifications demands to find out what is likely. For example, CompTIA official certifications demonstrates that you will have time connected with doing work working experience. By using a CompTIA review analyze guide, you will begin to recognize how the particular test-writers imagine to check out the way questions usually are questioned. Checking out It all official certifications online forums has become became a fantastic for your personal SY0-401 review preparing. Do you know of quite a few interesting accounts concerning ones analyze, or perhaps quite a few problems, together with quite a few treatments? Reveal them from the online community. Job hopefuls to whom time frame is a concern is going for education courses. It is actually well suited for prospects who have just some days or maybe a thirty days to go for the particular CompTIA review.Simplest way to find the skills you would like is usually to get on the web process checks for CompTIA review. That allows you to do the job when youve got time frame (if you usually do not decide to put ones studying out). CompTIA vendor sites keep you current with the most up-to-date announcement info as to what goings regarding from the technology entire world. Pay a visit to this frequently.

2021 Dec exam sy0-401 pdf:

Q301. Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program that encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same program to create a hidden volume within the encrypted hard drive and stores the sensitive information within the hidden volume. This is an example of which of the following? (Select TWO). 

A. Multi-pass encryption 

B. Transport encryption 

C. Plausible deniability 

D. Steganography 

E. Transitive encryption 

F. Trust models 

Answer: C,D 

Explanation: 


Q302. The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO’s requirements? 

A. Sniffers 

B. NIDS 

C. Firewalls 

D. Web proxies 

E. Layer 2 switches 

Answer:

Explanation: 

The basic purpose of a firewall is to isolate one network from another. 


Q303. Joe, the information security manager, is tasked with calculating risk and selecting controls to protect a new system. He has identified people, environmental conditions, and events that could affect the new system. Which of the following does he need to estimate NEXT in order to complete his risk calculations? 

A. Vulnerabilities 

B. Risk 

C. Likelihood 

D. Threats 

Answer:

Explanation: 


Q304. An internal auditing team would like to strengthen the password policy to support special characters. Which of the following types of password controls would achieve this goal? 

A. Add reverse encryption 

B. Password complexity 

C. Increase password length 

D. Allow single sign on 

Answer:

Explanation: 

Generally, the minimum password length is considered to be 8 upper and lowercase characters. The use of at least one non-alpha character like punctuation, special characters, or numbers, combined with the password length produces strong passwords. Strong passwords are produced by the combination of a password’s length and complexity. 


Q305. After a new firewall has been installed, devices cannot obtain a new IP address. Which of the following ports should Matt, the security administrator, open on the firewall? 

A. 25 

B. 68 

C. 80 

D. 443 

Answer:

Explanation: 

The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for distributing IP addresses for interfaces and services. DHCP makes use of port 68. 


Down to date comptia security+ get certified get ahead sy0-401 study guide download:

Q306. When a communications plan is developed for disaster recovery and business continuity plans, the MOST relevant items to include would be: (Select TWO). 

A. Methods and templates to respond to press requests, institutional and regulatory reporting requirements. 

B. Methods to exchange essential information to and from all response team members, employees, suppliers, and customers. 

C. Developed recovery strategies, test plans, post-test evaluation and update processes. 

D. Defined scenarios by type and scope of impact and dependencies, with quantification of loss potential. 

E. Methods to review and report on system logs, incident response, and incident handling. 

Answer: A,B 

Explanation: 

A: External emergency communications that should fit into your business continuity plan include notifying family members of an injury or death, discussing the disaster with the media, and providing status information to key clients and stakeholders. Each message needs to be prepared with the audience (e.g., employees, media, families, government regulators) in mind; broad general announcements may be acceptable in the initial aftermath of an incident, but these will need to be tailored to the audiences in subsequent releases. 

B: A typical emergency communications plan should be extensive in detail and properly planned by a business continuity planner. Internal alerts are sent using either email, overhead building paging systems, voice messages or text messages to cell/smartphones with instructions to evacuate the building and relocate at assembly points, updates on the status of the situation, and notification of when it's safe to return to work. 


Q307. Pete, a security analyst, has been tasked with explaining the different types of malware to his colleagues. The two malware types that the group seems to be most interested in are botnets and viruses. Which of the following explains the difference between these two types of malware? 

A. Viruses are a subset of botnets which are used as part of SYN attacks. 

B. Botnets are a subset of malware which are used as part of DDoS attacks. 

C. Viruses are a class of malware which create hidden openings within an OS. 

D. Botnets are used within DR to ensure network uptime and viruses are not. 

Answer:

Explanation: 

A botnet is a collection of Internet-connected programs communicating with other similar programs in order to perform tasks. This can be as mundane as keeping control of an Internet Relay Chat (IRC) channel, or it could be used to send spam email or participate in distributed denial-of-service attacks. The word botnet is a combination of the words robot and network. The term is usually used with a negative or malicious connotation. Computers can be co-opted into a botnet when they execute malicious software. This can be accomplished by luring users into making a drive-by download, exploiting web browser vulnerabilities, or by tricking the user into running a Trojan horse program, which may come from an email attachment. This malware will typically install modules that allow the computer to be commanded and controlled by the botnet's operator. Many computer users are unaware that their computer is infected with bots. Depending on how it is written, a Trojan may then delete itself, or may remain present to update and maintain the modules. 


Q308. At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access? 

A. Configure an access list. 

B. Configure spanning tree protocol. 

C. Configure port security. 

D. Configure loop protection. 

Answer:

Explanation: 

Port security in IT can mean several things. It can mean the physical control of all connection points, such as RJ-45 wall jacks or device ports, so that no unauthorized users or unauthorized devices can attempt to connect into an open port. This can be accomplished by locking down the wiring closet and server vaults and then disconnecting the workstation run from the patch panel (or punch-down block) that leads to a room’s wall jack. Any unneeded or unused wall jacks can (and should) be physically disabled in this manner. Another option is to use a smart patch panel that can monitor the MAC address of any device connected to each and every wall port across a building and detect not just when a new device is connected to an empty port, but also when a valid device is disconnected or replaced by an invalid device. 


Q309. Which of the following protocols is used by IPv6 for MAC address resolution? 

A. NDP 

B. ARP 

C. DNS 

D. NCP 

Answer:

Explanation: 

The Neighbor Discovery Protocol (NDP) is a protocol in the Internet protocol suite used with Internet Protocol Version 6 (IPv6). 


Q310. Which of the following is true about asymmetric encryption? 

A. A message encrypted with the private key can be decrypted by the same key 

B. A message encrypted with the public key can be decrypted with a shared key. 

C. A message encrypted with a shared key, can be decrypted by the same key. 

D. A message encrypted with the public key can be decrypted with the private key. 

Answer:

Explanation: 

Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys are referred to as the public key and the private key. The sender uses the public key to encrypt a message, and the receiver uses the private key to decrypt the message; what one key does, the other one undoes.