getcertified4sure.com

Finding Far out SY0-401 training materials




CompTIA CompTIA certification is the fantasy of every one of the IT enthusiasts that want to have a very bright future in the discipline of The idea. However, passing the particular CompTIA certification exam is not a good easy activity only simply by yourself. Should you be one of these kind of IT aspirants, please cease at Pass4sure.net and discover everything you would like for the CompTIA SY0-401 exam preparation.

2021 Apr SY0-401 exam engine

Q441. HOTSPOT 

Select the appropriate attack from each drop down list to label the corresponding illustrated attack 

Instructions: Attacks may only be used once, and will disappear from drop down list if selected. 

When you have completed the simulation, please select the Done button to submit. 

Answer: 

Explanation: 

References: 

http://searchsecurity.techtarget.com/definition/spear-phishing http://www.webopedia.com/TERM/V/vishing.html http://www.webopedia.com/TERM/P/phishing.html 

http://www.webopedia.com/TERM/P/pharming.html 


Q442. Which of the following file systems is from Microsoft and was included with their earliest operating systems? 

A. NTFS 

B. UFS 

C. MTFS 

D. FAT 

Answer:

Explanation: 

File Allocation Table (FAT) is a file system created by Microsoft and used for its earliest DOS operating systems. 


Q443. A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control? 

A. Implicit deny 

B. Role-based Access Control 

C. Mandatory Access Controls 

D. Least privilege 

Answer:

Explanation: 

Mandatory Access Control allows access to be granted or restricted based on the rules of classification. MAC also includes the use of need to know. Need to know is a security restriction where some objects are restricted unless the subject has a need to know them. 


Q444. A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default? 

A. 20 

B. 21 

C. 22 

D. 23 

Answer:

Explanation: 

When establishing an FTP session, clients start a connection to an FTP server that listens on TCP port 21 by default. 


Q445. A customer service department has a business need to send high volumes of confidential information to customers electronically. All emails go through a DLP scanner. Which of the following is the BEST solution to meet the business needs and protect confidential information? 

A. Automatically encrypt impacted outgoing emails 

B. Automatically encrypt impacted incoming emails 

C. Monitor impacted outgoing emails 

D. Prevent impacted outgoing emails 

Answer:

Explanation: 

Encryption is done to protect confidentiality and integrity of data. It also provides authentication, nonrepudiation and access control to the data. Since all emails go through a DLP scanner and it is outgoing main that requires protection then the best option is to put a system in place that will encrypt the outgoing emails automatically. 


Renovate SY0-401 test questions:

Q446. Which of the following is mainly used for remote access into the network? 

A. XTACACS 

B. TACACS+ 

C. Kerberos 

D. RADIUS 

Answer:

Explanation: 

Most gateways that control access to the network have a RADIUS client component that communicates with the RADIUS server. Therefore, it can be inferred that RADIUS is primarily used for remote access. 


Q447. Ann, the network administrator, is receiving reports regarding a particular wireless network in the building. The network was implemented for specific machines issued to the developer department, but the developers are stating that they are having connection issues as well as slow bandwidth. Reviewing the wireless router's logs, she sees that devices not belonging to the developers are connecting to the access point. Which of the following would BEST alleviate the developer's reports? 

A. Configure the router so that wireless access is based upon the connecting device's hardware address. 

B. Modify the connection's encryption method so that it is using WEP instead of WPA2. 

C. Implement connections via secure tunnel with additional software on the developer's computers. 

D. Configure the router so that its name is not visible to devices scanning for wireless networks. 

Answer:

Explanation: 


Q448. An administrator needs to connect a router in one building to a router in another using Ethernet. Each router is connected to a managed switch and the switches are connected to each other via a fiber line. Which of the following should be configured to prevent unauthorized devices from connecting to the network? 

A. Configure each port on the switches to use the same VLAN other than the default one 

B. Enable VTP on both switches and set to the same domain 

C. Configure only one of the routers to run DHCP services 

D. Implement port security on the switches 

Answer:

Explanation: 

Port security in IT can mean several things: The physical control of all connection points, such as RJ-45 wall jacks or device ports, so that no unauthorized users or unauthorized devices can attempt to connect into an open port. The management of TCP and User Datagram Protocol (UDP) ports. If a service is active and assigned to a port, then that port is open. All the other 65,535 ports (of TCP or UDP) are closed if a service isn’t actively using them. Port knocking is a security system in which all ports on a system appear closed. However, if the client sends packets to a specific set of ports in a certain order, a bit like a secret knock, then the desired service port becomes open and allows the client software to connect to the service. 


Q449. Employee badges are encoded with a private encryption key and specific personal information. 

The encoding is then used to provide access to the network. Which of the following describes this access control type? 

A. Smartcard 

B. Token 

C. Discretionary access control 

D. Mandatory access control 

Answer:

Explanation: 

Smart cards are credit-card-sized IDs, badges, or security passes with an embedded integrated circuit chip that can include data regarding the authorized bearer. This data can then be used for identification and/or authentication purposes. 


Q450. DRAG DROP 

A security administrator is given the security and availability profiles for servers that are being deployed. 

1) Match each RAID type with the correct configuration and MINIMUM number of drives. 

2) Review the server profiles and match them with the appropriate RAID type based on integrity, availability, I/O, storage requirements. Instructions: 

. All drive definitions can be dragged as many times as necessary 

. Not all placeholders may be filled in the RAID configuration boxes 

. If parity is required, please select the appropriate number of parity checkboxes 

. Server profiles may be dragged only once 

If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue. 

Answer: