getcertified4sure.com

Update SY0-401: Examcollection real preparation from 311 to 320




Free of SY0-401 vce materials and pack for CompTIA certification for IT examinee, Real Success Guaranteed with Updated SY0-401 pdf dumps vce Materials. 100% PASS CompTIA Security+ Certification exam Today!

2021 Mar SY0-401 free practice questions

Q311. A CRL is comprised of. 

A. Malicious IP addresses. 

B. Trusted CA’s. 

C. Untrusted private keys. 

D. Public keys. 

Answer:

Explanation: 

A certificate revocation list (CRL) is created and distributed to all CAs to revoke a certificate or 

key. 

By checking the CRL you can check if a particular certificate has been revoked. 

The certificates for which a CRL should be maintained are often X.509/public key certificates, as 

this format is commonly used by PKI schemes. 


Q312. A software developer is responsible for writing the code on an accounting application. Another software developer is responsible for developing code on a system in human resources. Once a year they have to switch roles for several weeks. 

Which of the following practices is being implemented? 

A. Mandatory vacations 

B. Job rotation 

C. Least privilege 

D. Separation of duties 

Answer:

Explanation: 

A job rotation policy defines intervals at which employees must rotate through positions. 


Q313. Ann, a security analyst, has discovered that her company has very high staff turnover and often user accounts are not disabled after an employee leaves the company. Which of the following could Ann implement to help identify accounts that are still active for terminated employees? 

A. Routine audits 

B. Account expirations 

C. Risk assessments 

D. Change management 

Answer:

Explanation: 


Q314. An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests. Which of the following describes how this private key should be stored so that it is protected from theft? 

A. Implement full disk encryption 

B. Store on encrypted removable media 

C. Utilize a hardware security module 

D. Store on web proxy file system 

Answer:

Explanation: 

Hardware Security Module (HSM) hardware-based encryption solution that is usually used in conjunction with PKI to enhance security with certification authorities (CAs). It is available as an expansion card and can cryptographic keys, passwords, or certificates. 


Q315. A company determines a need for additional protection from rogue devices plugging into physical ports around the building. 

Which of the following provides the highest degree of protection from unauthorized wired network access? 

A. Intrusion Prevention Systems 

B. MAC filtering 

C. Flood guards 

D. 802.1x 

Answer:

Explanation: 

IEEE 802.1x is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols and provides an authentication mechanism to wireless devices connecting to a LAN or WLAN. 


Rebirth SY0-401 free practice exam:

Q316. Which of the following protocols is MOST likely to be leveraged by users who need additional information about another user? 

A. LDAP 

B. RADIUS 

C. Kerberos 

D. TACACS+ 

Answer:

Explanation: 


Q317. The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO’s requirements? 

A. Sniffers 

B. NIDS 

C. Firewalls 

D. Web proxies 

E. Layer 2 switches 

Answer:

Explanation: 

The basic purpose of a firewall is to isolate one network from another. 


Q318. A recent audit has revealed weaknesses in the process of deploying new servers and network devices. Which of the following practices could be used to increase the security posture during deployment? (Select TWO). 

A. Deploy a honeypot 

B. Disable unnecessary services 

C. Change default passwords 

D. Implement an application firewall 

E. Penetration testing 

Answer: B,C 

Explanation: 


Q319. Which of the following has a storage root key? 

A. HSM 

B. EFS 

C. TPM 

D. TKIP 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates on non-volatile (NV) memory. Data stored on NV memory is retained unaltered when the device has no power. The storage root key is embedded in the TPM to protect TPM keys created by applications, so that these keys cannot be used without the TPM. 


Q320. The chief Risk officer is concerned about the new employee BYOD device policy and has requested the security department implement mobile security controls to protect corporate data in the event that a device is lost or stolen. The level of protection must not be compromised even if the communication SIM is removed from the device. Which of the following BEST meets the requirements? (Select TWO) 

A. Asset tracking 

B. Screen-locks 

C. GEO-Tracking 

D. Device encryption 

Answer: A,D 

Explanation: 

A: Asset tracking is the process of maintaining oversight over inventory, and ensuring that a device is still in the possession of the assigned authorized user. 

D: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen.