Want to know Testking sy0 401 pdf Exam practice test features? Want to lear more about CompTIA CompTIA Security+ Certification certification experience? Study Actual CompTIA sy0 401 dump answers to Updated sy0 401 vce questions at Testking. Gat a success with an absolute guarantee to pass CompTIA comptia security+ sy0 401 (CompTIA Security+ Certification) test on your first attempt.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q291. Several employees submit the same phishing email to the administrator. The administrator finds that the links in the email are not being blocked by the company’s security device. Which of the following might the administrator do in the short term to prevent the emails from being received? 

A. Configure an ACL 

B. Implement a URL filter 

C. Add the domain to a block list 

D. Enable TLS on the mail server 

Answer:

Explanation: 

Blocking e-mail is the same as preventing the receipt of those e-mails and this is done by applying a filter. But the filter must be configured to block it. Thus you should add that specific domain from where the e-mails are being sent to the list of addresses that is to be blocked. 


Q292. Which of the following data security techniques will allow Matt, an IT security technician, to encrypt a system with speed as its primary consideration? 

A. Hard drive encryption 

B. Infrastructure as a service 

C. Software based encryption 

D. Data loss prevention 

Answer:

Explanation: 

Disk and device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. It should be implemented using a hardware-based solution for greater speed. 


Q293. Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee’s credential? 

A. Account expiration 

B. Password complexity 

C. Account lockout 

D. Dual factor authentication 

Answer:

Explanation: 

Account expiration is a secure feature to employ on user accounts for temporary workers, interns, or consultants. It automatically disables a user account or causes the account to expire at a specific time and on a specific day. 


Q294. After encrypting all laptop hard drives, an executive officer’s laptop has trouble booting to the operating system. Now that it is successfully encrypted the helpdesk cannot retrieve the data. 

Which of the following can be used to decrypt the information for retrieval? 

A. Recovery agent 

B. Private key 

C. Trust models 

D. Public key 

Answer:

Explanation: 

To access the data the hard drive need to be decrypted. To decrypt the hard drive you would need 

the proper private key. The key recovery agent can retrieve the required key. 

A key recovery agent is an entity that has the ability to recover a key, key components, or plaintext 

messages as needed. 


Q295. Mandatory vacations are a security control which can be used to uncover which of the following? 

A. Fraud committed by a system administrator 

B. Poor password security among users 

C. The need for additional security staff 

D. Software vulnerabilities in vendor code 

Answer:

Explanation: 

Mandatory vacations also provide an opportunity to discover fraud apart from the obvious benefits of giving employees a chance to refresh and making sure that others in the company can fill those positions and make the company less dependent on those persons; a sort pf replication and duplication at all levels. 


Q296. A user reports being unable to access a file on a network share. The security administrator determines that the file is marked as confidential and that the user does not have the appropriate access level for that file. Which of the following is being implemented? 

A. Mandatory access control 

B. Discretionary access control 

C. Rule based access control 

D. Role based access control 

Answer:

Explanation: 

Mandatory Access Control (MAC) allows access to be granted or restricted based on the rules of classification. MAC in corporate business environments involve the following four sensitivity levels Public Sensitive Private Confidential 

MAC assigns subjects a clearance level and assigns objects a sensitivity label. The name of the clearance level must be the same as the name of the sensitivity label assigned to objects or resources. In this case the file is marked confidential, and the user does not have that clearance level and cannot access the file. 


Q297. Which of the following controls can be implemented together to prevent data loss in the event of theft of a mobile device storing sensitive information? (Select TWO). 

A. Full device encryption 

B. Screen locks 

C. GPS 

D. Asset tracking 

E. Inventory control 

Answer: A,B 

Explanation: 

A: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. 

B: Screen locks are a security feature that requires the user to enter a PIN or a password after a short period of inactivity before they can access the system again. This feature ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications. 


Q298. A database administrator would like to start encrypting database exports stored on the SAN, but the storage administrator warns that this may drastically increase the amount of disk space used by the exports. Which of the following explains the reason for the increase in disk space usage? 

A. Deduplication is not compatible with encryption 

B. The exports are being stored on smaller SAS drives 

C. Encrypted files are much larger than unencrypted files 

D. The SAN already uses encryption at rest 

Answer:

Explanation: 

Encryption adds overhead to the data which results in and increase in file size. This overhead is attached to each file and could include the encryption/decryption key, data recovery files and data decryption field in file header. As a result, requires increased storage space. 


Q299. Which of the following can result in significant administrative overhead from incorrect reporting? 

A. Job rotation 

B. Acceptable usage policies 

C. False positives 

D. Mandatory vacations 

Answer:

Explanation: 

False positives are essentially events that are mistakenly flagged and are not really events to be concerned about. This causes a significant administrative overhead because the reporting is what results in the false positives. 


Q300. Which of the following is an XML based open standard used in the exchange of authentication and authorization information between different parties? 

A. LDAP 

B. SAML 

C. TACACS+ 

D. Kerberos 

Answer:

Explanation: 

Security Assertion Markup Language (SAML) is an open-standard data format centred on XML. It is used for supporting the exchange of authentication and authorization details between systems, services, and devices.