♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q591. A large bank has moved back office operations offshore to another country with lower wage costs in an attempt to improve profit and productivity. Which of the following would be a customer concern if the offshore staff had direct access to their data? 

A. Service level agreements 

B. Interoperability agreements 

C. Privacy considerations 

D. Data ownership 

Answer:

Explanation: 


Q592. A computer is suspected of being compromised by malware. The security analyst examines the computer and finds that a service called Telnet is running and connecting to an external website over port 443. This Telnet service was found by comparing the system’s services to the list of standard services on the company’s system image. This review process depends on: 

A. MAC filtering. 

B. System hardening. 

C. Rogue machine detection. 

D. Baselining. 

Answer:

Explanation: 

Application baseline defines the level or standard of security that will be implemented and maintained for the application. It may include requirements of hardware components, operating system versions, patch levels, installed applications and their configurations, and available ports and services. Systems can be compared to the baseline to ensure that the required level of security is being maintained. 


Q593. Which of the following are Data Loss Prevention (DLP) strategies that address data in transit issues? (Select TWO). 

A. Scanning printing of documents. 

B. Scanning of outbound IM (Instance Messaging). 

C. Scanning copying of documents to USB. 

D. Scanning of SharePoint document library. 

E. Scanning of shared drives. 

F. Scanning of HTTP user traffic. 

Answer: B,F 

Explanation: 

DLP systems monitor the contents of systems (workstations, servers, networks) to make sure key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data. Outbound IM and HTTP user traffic refers to data over a network which falls within the DLP strategy. 


Q594. In which of the following scenarios is PKI LEAST hardened? 

A. The CRL is posted to a publicly accessible location. 

B. The recorded time offsets are developed with symmetric keys. 

C. A malicious CA certificate is loaded on all the clients. 

D. All public keys are accessed by an unauthorized user. 

Answer:

Explanation: 

A rogue Certification Authority (CA) certificate allows malicious users to impersonate any Web site on the Internet, including banking and e-commerce sites secured using the HTTPS protocol. A rogue CA certificate would be seen as trusted by Web browsers, and it is harmful because it can appear to be signed by one of the root CAs that browsers trust by default. A rogue Certification Authority (CA) certificate can be created using a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure Web sites. 


Q595. Which of the following assessment techniques would a security administrator implement to ensure that systems and software are developed properly? 

A. Baseline reporting 

B. Input validation 

C. Determine attack surface 

D. Design reviews 

Answer:

Explanation: 

When implementing systems and software, an important step is the design of the systems and 

software. The systems and software should be designed to ensure that the system works as 

intended and is secure. 

The design review assessment examines the ports and protocols used, the rules, segmentation, 

and access control in the system or application. A design review is basically a check to ensure that 

the design of the system meets the security requirements. 


Q596. During a server audit, a security administrator does not notice abnormal activity. However, a network security analyst notices connections to unauthorized ports from outside the corporate network. Using specialized tools, the network security analyst also notices hidden processes running. Which of the following has MOST likely been installed on the server? 

A. SPIM 

B. Backdoor 

C. Logic bomb 

D. Rootkit 

Answer:

Explanation: 

A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a cracker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking a password. Once the rootkit is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and, possibly, other machines on the network. A rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. The presence of a rootkit on a network was first documented in the early 1990s. At that time, Sun and Linux operating systems were the primary targets for a hacker looking to install a rootkit. Today, rootkits are available for a number of operating systems, including Windows, and are increasingly difficult to detect on any network. 


Q597. Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task? (Select TWO). 

A. Private hash 

B. Recovery agent 

C. Public key 

D. Key escrow 

E. CRL 

Answer: B,D 

Explanation: 

B: If an employee leaves and we need access to data he has encrypted, we can use the key recovery agent to retrieve his decryption key. We can use this recovered key to access the data. A key recovery agent is an entity that has the ability to recover a key, key components, or plaintext messages as needed. As opposed to escrow, recovery agents are typically used to access information that is encrypted with older keys. 

D: If a key need to be recovered for legal purposes the key escrow can be used. Key escrow addresses the possibility that a third party may need to access keys. Under the conditions of key escrow, the keys needed to encrypt/decrypt data are held in an escrow account (think of the term as it relates to home mortgages) and made available if that third party requests them. The third party in question is generally the government, but it could also be an employer if an employee’s private messages have been called into question. 


Q598. Which of the following describes the purpose of an MOU? 

A. Define interoperability requirements 

B. Define data backup process 

C. Define onboard/offboard procedure 

D. Define responsibilities of each party 

Answer:

Explanation: 

MOU or Memorandum of Understanding is a document outlining which party is responsible for what portion of the work. 


Q599. Ann is an employee in the accounting department and would like to work on files from her home computer. She recently heard about a new personal cloud storage service with an easy web interface. Before uploading her work related files into the cloud for access, which of the following is the MOST important security concern Ann should be aware of? 

A. Size of the files 

B. Availability of the files 

C. Accessibility of the files from her mobile device 

D. Sensitivity of the files 

Answer:

Explanation: 


Q600. Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of: 

A. Redundant systems. 

B. Separation of duties. 

C. Layered security. 

D. Application control. 

Answer:

Explanation: 

Layered security is the practice of combining multiple mitigating security controls to protect resources and data.