Our CompTIA CompTIA exam questions along with answers are introduced in 2 versions. One can be Pdf formats that happen to be printable and the some other is Check Engine software which is downloadable. Both are usually free for you after acquiring. Stay in the home and download the actual CompTIA test serp and understand them with your own rate. All the necessary practice materials in the CompTIA exam braindumps are valuable for you to be able to prepare to the CompTIA SY0-401 exam. Our team of certified experts analysis and create the actual CompTIA certification exam dumps according to the actual syllabus of the CompTIA actual test. The SY0-401 practice questions are updated continuously and provided on the Testking site timely. You should visit our own home page regularly in order to revise your own CompTIA CompTIA exam practice tests in occasion.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

2021 Mar SY0-401 test question

Q501. Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT group, to edit a file. Currently, the file has the following permissions: Ann: read/write 

Sales Group: read 

IT Group: no access 

If a discretionary access control list is in place for the files owned by Ann, which of the following would be the BEST way to share the file with Joe? 

A. Add Joe to the Sales group. 

B. Have the system administrator give Joe full access to the file. 

C. Give Joe the appropriate access to the file directly. 

D. Remove Joe from the IT group and add him to the Sales group. 

Answer:

Explanation: 


Q502. A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access? 

A. SCP 

B. SSH 

C. SFTP 

D. HTTPS 

Answer:

Explanation: 

Secure Shell (SSH) is a tunneling protocol originally used on Unix systems. It’s now available for both Unix and Windows environments. SSH is primarily intended for interactive terminal sessions. SSH is used to establish a command-line, text-only interface connection with a server, router, switch, or similar device over any distance. 


Q503. Which of the following protocols operates at the HIGHEST level of the OSI model? 

A. ICMP 

B. IPSec 

C. SCP 

D. TCP 

Answer:

Explanation: 

SCP (Secure Copy) uses SSH (Secure Shell). SSH runs in the application layer (layer 7) of the OSI model. 


Q504. Which of the following offers the LEAST secure encryption capabilities? 

A. TwoFish 

B. PAP 

C. NTLM 

D. CHAP 

Answer:

Explanation: 

PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like CHAP or EAP. 


Q505. A company hired Joe, an accountant. The IT administrator will need to create a new account for 

Joe. The company uses groups for ease of management and administration of user accounts. 

Joe will need network access to all directories, folders and files within the accounting department. 

Which of the following configurations will meet the requirements? 

A. Create a user account and assign the user account to the accounting group. 

B. Create an account with role-based access control for accounting. 

C. Create a user account with password reset and notify Joe of the account creation. 

D. Create two accounts: a user account and an account with full network administration rights. 

Answer:

Explanation: 

Role-based Access Control is basically based on a user’s job description. When a user is assigned a specific role in an environment, that user’s access to objects is granted based on the required tasks of that role. The IT administrator should, therefore, create an account with role-based access control for accounting for Joe. 


Most recent SY0-401 dumps:

Q506. A security administrator must implement a secure key exchange protocol that will allow company clients to autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the following MUST be implemented? 

A. SHA-256 

B. AES 

C. Diffie-Hellman 

D. 3DES 

Answer:

Explanation: 


Q507. A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates. 

Which of the following processes could MOST effectively mitigate these risks? 

A. Application hardening 

B. Application change management 

C. Application patch management 

D. Application firewall review 

Answer:

Explanation: 

The question states that operating system updates are applied but not other software updates. The ‘other software’ in this case would be applications. Software updates includes functionality updates and more importantly security updates. The process of applying software updates or ‘patches’ to applications is known as ‘application patch management’. Application patch management is an effective way of mitigating security risks associated with software applications. 


Q508. A security administrator wants to test the reliability of an application which accepts user provided parameters. The administrator is concerned with data integrity and availability. Which of the following should be implemented to accomplish this task? 

A. Secure coding 

B. Fuzzing 

C. Exception handling 

D. Input validation 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Q509. A technician is reviewing the logical access control method an organization uses. One of the senior managers requests that the technician prevent staff members from logging on during nonworking days. Which of the following should the technician implement to meet managements request? 

A. Enforce Kerberos 

B. Deploy smart cards 

C. Time of day restrictions 

D. Access control lists 

Answer:

Explanation: Time of day restrictions limit when users can access specific systems based on the time of day or week. It can limit access to sensitive environments to normal business hours. 


Q510. Visible security cameras are considered to be which of the following types of security controls? 

A. Technical 

B. Compensating 

C. Deterrent 

D. Administrative 

Answer:

Explanation: