Download New Updated (July) CompTIA SY0-401 Actual Test 21-30

Ensurepass

 

 

QUESTION 21

A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability.

 

Which of the following BEST describes this exploit?

 

A.

Malicious insider threat

B.

Zero-day

C.

Client-side attack

D.

Malicious add-on

 

Correct Answer: < /b>B

 

 

QUESTION 22

A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on which of the following?

 

A.

Peer to Peer

B.

Mobile devices

C.

Social networking

D.

Personally owned devices

 

Correct Answer: C

 

 

QUESTION 23

A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates.

 

Which of the following processes could MOST effectively mitigate these risks?

 

A.

Application hardening

B.

Application change management

C.

Application patch management

D.

Application firewall review

 

Correct Answer: C

 

 

QUESTION 24

A software developer is responsible for writing the code on an accounting application. Another software developer is responsible for developing code on a system in human resources. Once a year they have to switch roles for several weeks.

 

Which of the following practices is being implemented?

 

A.

Mandatory vacations

B.

Job rotation

C.

Least privilege

D.

Separation of duties

 

Correct Answer: B

&nbs
p;

 

QUESTION 25

A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?

 

A.

IPsec

B.

SFTP

C.

BGP

D.

PPTP

 

Correct Answer: A

QUESTION 26

Which of the following implementation steps would be appropriate for a public wireless hot-spot?

 

A.

Reduce power level

B.

Disable SSID broadcast

C.

Open system authentication

D.

MAC filter

 

Correct Answer: C

 

 

QUESTION 27

Which of the following is a step in deploying a WPA2-Enterprise wireless network?

 

A.

Install a token on the authentication server

B.

Install a DHCP server on the authentication server

C.

Install an encryption key on the authentication server

D.

Install a digital certificate on the authentication server

 

Correct Answer: D

 

 

QUESTION 28

Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?

 

A.

802.1x< /span>

B.

Data encryption

C.

Password strength

D.

BGP

 

Correct Answer: A

 

 

QUESTION 29

Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?

 

A.

Installing anti-malware

B.

Implementing an IDS

C.

Taking a baseline configuration

D.

Disabling unnecessary services

 

Correct Answer: D

 

 

QUESTION 30

A security manager must remain aware of the security posture of each system. Which of the following supports this requirement?

 

A.

Training staff on security policies

B.

Establishing baseline reporting

C.

Installing anti-malware software

D.

Disabling unnecessary accounts/services

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized and tagged , , , , , , . Bookmark the permalink.