getcertified4sure.com

What Rebirth SY0-401 Is?




Exam Code: SY0-401 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Security+ Certification
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass SY0-401 Exam.

2021 Apr SY0-401 free practice questions

Q181. Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to? 

A. PAP, MSCHAPv2 

B. CHAP, PAP 

C. MSCHAPv2, NTLMv2 

D. NTLM, NTLMv2 

Answer:

Explanation: 

PAP transmits the username and password to the authentication server in plain text. MSCHAPv2 is utilized as an authentication option for RADIUS servers that are used for Wi-Fi security using the WPA-Enterprise protocol. 


Q182. Ann has recently transferred from the payroll department to engineering. While browsing file shares, Ann notices she can access the payroll status and pay rates of her new coworkers. Which of the following could prevent this scenario from occurring? 

A. Credential management 

B. Continuous monitoring 

C. Separation of duties 

D. User access reviews 

Answer:

Explanation: 


Q183. A system administrator has concerns regarding their users accessing systems and secured areas using others’ credentials. Which of the following can BEST address this concern? 

A. Create conduct policies prohibiting sharing credentials. 

B. Enforce a policy shortening the credential expiration timeframe. 

C. Implement biometric readers on laptops and restricted areas. 

D. Install security cameras in areas containing sensitive systems. 

Answer:

Explanation: 

Biometrics is an authentication process that makes use of physical characteristics to establish identification. This will prevent users making use of others credentials. 


Q184. After running into the data center with a vehicle, attackers were able to enter through the hole in the building and steal several key servers in the ensuing chaos. Which of the following security measures can be put in place to mitigate the issue from occurring in the future? 

A. Fencing 

B. Proximity readers 

C. Video surveillance 

D. Bollards 

Answer:

Explanation: 

To stop someone from entering a facility, barricades or gauntlets can be used. These are often used in conjunction with guards, fencing, and other physical security measures. Bollards are physical barriers that are strong enough to withstand impact with a vehicle. 


Q185. Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety of servers before deployment to the production environment while utilizing a limited amount of hardware resources. Which of the following would provide the BEST environment for performing this testing? 

A. OS hardening 

B. Application control 

C. Virtualization 

D. Sandboxing 

Answer:

Explanation: 


Down to date SY0-401 download:

Q186. A security administrator is tackling issues related to authenticating users at a remote site. There have been a large number of security incidents that resulted from either tailgating or impersonation of authorized users with valid credentials. The security administrator has been told to implement multifactor authentication in order to control facility access. To secure access to the remote facility, which of the following could be implemented without increasing the amount of space required at the entrance? 

A. MOTD challenge and PIN pad 

B. Retina scanner and fingerprint reader 

C. Voice recognition and one-time PIN token 

D. One-time PIN token and proximity reader 

Answer:

Explanation: 


Q187. An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-to-peer network that cannot connect to the Internet. The ISSO can update the antivirus definitions manually, but which of the following steps is MOST important? 

A. A full scan must be run on the network after the DAT file is installed. 

B. The signatures must have a hash value equal to what is displayed on the vendor site. 

C. The definition file must be updated within seven days. 

D. All users must be logged off of the network prior to the installation of the definition file. 

Answer:

Explanation: 

A hash value can be used to uniquely identify secret information. This requires that the hash function is collision resistant, which means that it is very hard to find data that generate the same hash value and thus it means that in hashing two different inputs will not yield the same output. Thus the hash value must be equal to that displayed on the vendor site. 


Q188. An information bank has been established to store contacts, phone numbers and other records. 

An application running on UNIX would like to connect to this index server using port 88. Which of the following authentication services would this use this port by default? 

A. Kerberos 

B. TACACS+ 

C. Radius 

D. LDAP 

Answer:

Explanation: Kerberos makes use of port 88. 


Q189. Which of the following may significantly reduce data loss if multiple drives fail at the same time? 

A. Virtualization 

B. RAID 

C. Load balancing 

D. Server clustering 

Answer:

Explanation: 

RAID, or redundant array of independent disks (RAID). RAID allows your existing servers to have more than one hard drive so that if the main hard drive fails, the system keeps functioning. 


Q190. Joe, an employee is taking a taxi through a busy city and starts to receive unsolicited files sent to his Smartphone. Which of the following is this an example of? 

A. Vishing 

B. Bluejacking 

C. War Driving 

D. SPIM 

E. Bluesnarfing 

Answer:

Explanation: 

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters. Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in guerrilla marketing campaigns to promote advergames.