getcertified4sure.com

Tips to Pass SY0-401 Exam (221 to 230)




Testking provides all of the CompTIA certification exam questions and answers that are written to the high criteria of technical accuracy. Testking.internet is the only site which offers preparation resources for all of the certification exams. Our certified professionals have rich experience in compiling as well as revising the CompTIA CompTIA SY0-401 exam questions. The corresponding answers are precise, accurate and throughout details. Theyre not only effortlessly understandable but additionally technical and professional.

2021 Mar SY0-401 braindumps

Q221. In order for network monitoring to work properly, you need a PC and a network card running in what mode? 

A. Launch 

B. Exposed 

C. Promiscuous 

D. Sweep 

Answer:

Explanation: 

Promiscuous mode allows the network card to look at any packet that it sees on the network. This even includes packets that are not addressed to that network card. 


Q222. Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. 

Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. 

Which of the following should Sara do to address the risk? 

A. Accept the risk saving $10,000. 

B. Ignore the risk saving $5,000. 

C. Mitigate the risk saving $10,000. 

D. Transfer the risk saving $5,000. 

Answer:

Explanation: 

Risk transference involves sharing some of the risk burden with someone else, such as an insurance company. The cost of the security breach over a period of 5 years would amount to $30,000 and it is better to save $5,000. 


Q223. The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future? 

A. Job rotation 

B. Separation of duties 

C. Mandatory Vacations 

D. Least Privilege 

Answer:

Explanation: 

Separation of duties means that users are granted only the permissions they need to do their work and no more. More so it means that you are employing best practices. The segregation of duties and separation of environments is a way to reduce the likelihood of misuse of systems or information. A separation of duties policy is designed to reduce the risk of fraud and to prevent other losses in an organization. 


Q224. Which of the following disaster recovery strategies has the highest cost and shortest recovery time? 

A. Warm site 

B. Hot site 

C. Cold site 

D. Co-location site 

Answer:

Explanation: 

A hot site is a location that can provide operations within hours of a failure. This type of site would have servers, networks, and telecommunications equipment in place to reestablish service in a short time. Hot sites provide network connectivity, systems, and preconfigured software to meet the needs of an organization. Databases can be kept up-to-date using network connections. These types of facilities are expensive, and they’re primarily suitable for short-term situations. 


Q225. A company’s security administrator wants to manage PKI for internal systems to help reduce costs. Which of the following is the FIRST step the security administrator should take? 

A. Install a registration server. 

B. Generate shared public and private keys. 

C. Install a CA 

D. Establish a key escrow policy. 

Answer:

Explanation: 

PKI is a two-key, asymmetric system with four main components: certificate authority (CA), registration authority (RA), RSA (the encryption algorithm), and digital certificates. When you implement a PKI you should start by installing a CA. 


Improve SY0-401 exam cost:

Q226. A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure? 

A. IPsec 

B. SFTP 

C. BGP 

D. PPTP 

Answer:

Explanation: 

Layer 2 Tunneling Protocol (L2TP) came about through a partnership between Cisco and Microsoft with the intention of providing a more secure VPN protocol. L2TP is considered to be a more secure option than PPTP, as the IPSec protocol which holds more secure encryption algorithms, is utilized in conjunction with it. It also requires a pre-shared certificate or key. L2TP’s strongest level of encryption makes use of 168 bit keys, 3 DES encryption algorithm and requires two levels of authentication. L2TP has a number of advantages in comparison to PPTP in terms of providing data integrity and authentication of origin verification designed to keep hackers from compromising the system. However, the increased overhead required to manage this elevated security means that it performs at a slower pace than PPTP. 


Q227. Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer information in a recycle bin without shredding it first. This is MOST likely to increase the risk of loss from which of the following attacks? 

A. Shoulder surfing 

B. Dumpster diving 

C. Tailgating 

D. Spoofing 

Answer:

Explanation: 

Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes. Seemingly innocent information like a phone list, calendar, or organizational chart can be used to assist an attacker using social engineering techniques to gain access to the network. To prevent dumpster divers from learning anything valuable from your trash, experts recommend that your company establish a disposal policy where all paper, including print-outs, is shredded in a cross-cut shredder before being recycled, all storage media is erased, and all staff is educated about the danger of untracked trash. 


Q228. TION NO: 134 

Which of the following ports is used for SSH, by default? 

A. 23 

B. 32 

C. 12 

D. 22 

Answer:

Explanation: 

Secure Shell (SSH) is a cryptographic network protocol for securing data communication. It establishes a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login, remote command execution, but any network service can be secured with SSH. SSH uses port 22. 


Q229. A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access? 

A. SCP 

B. SSH 

C. SFTP 

D. HTTPS 

Answer:

Explanation: 

Secure Shell (SSH) is a tunneling protocol originally used on Unix systems. It’s now available for both Unix and Windows environments. SSH is primarily intended for interactive terminal sessions. SSH is used to establish a command-line, text-only interface connection with a server, router, switch, or similar device over any distance. 


Q230. An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files should be copied from srv4 to accomplish this? 

A. certificate, private key, and intermediate certificate chain 

B. certificate, intermediate certificate chain, and root certificate 

C. certificate, root certificate, and certificate signing request 

D. certificate, public key, and certificate signing request 

Answer:

Explanation: 

a wildcard certificate is a public key certificate which can be used with multiple subdomains of a domain. In public-key cryptography, the receiver has a private key known only to them; a public key corresponds to it, which they make known to others. The public key can be sent to all other parties; the private key is never divulged. A symmetric algorithm requires that receivers of the message use the same private key. Thus you should copy the certificate, the private key and the intermediate certificate chain from srv4 to srv5.