Download New Updated (July) CompTIA SY0-401 Actual Test 241-250

Ensurepass

 

QUESTION 241

Privilege creep among long-term employees can be mitigated by which of the following procedures?

 

A.

User permission reviews

B.

Mandatory vacations

C.

Separation of duties

D.

Job function rotation

 

Correct Answer: A

 

 

QUESTION 242

In which of the following scenarios is PKI LEAST hardened?

 

A.

The CRL is posted to a publicly accessible location.

B.

The recorded time offsets are developed with symmetric keys.

C.

A malicious CA certificate is loaded on all the clients.

D.

All public keys are accessed by an unauthorized user.

 

Correct Answer: C

 

 

QUESTION 243

Configuring the mode, encryption methods, and security associations are part of which of the following?

&
nbsp;

A.

IPSec

B.

Full disk encryption

C.

802.1x

D.

PKI

 

Correct Answer: A

 

 

QUESTION 244

Which of the following assessments would Pete, the security administrator, use to actively test that an application’s security controls are in place?

 

A.

Code review

B.

Penetration test

C.

Protocol analyzer

D.

Vulnerability scan

 

Correct Answer: B

 

 

QUESTION 245

A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?

 

< td style="border-top-style: none; background: white; border-bottom-style: none; padding-bottom: 0cm; padding-top: 0cm; border-right-style: none; padding-left: 0cm; border-left-style: none; padding-right: 0cm" valign="top" width="26">

B.

A.

Confidentiality

Availability

C.

Succession planning

D.

Integrity

 

Correct Answer: B

 

 

QUESTION 246

In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in QUESTION NO: from the incident manager. Which of the following incident response procedures would he need to perform in order to begin the analysis? (Select TWO).

 

A.

Take hashes

B.

Begin the chain of custody paperwork

C.

Take screen shots

D.

Capture the system image

E.

Decompile suspicious files

 

Correct Answer: AD

 

 

QUESTION 247

Which of the following is used to certify intermediate authorities in a large PKI deployment?

 

A.

Root CA

B.

Recovery agent

C.

Root user

D.

Key escrow

 

Correct Answer: A

 

QUESTION 248

Which of the following components MUST be trusted by all parties in PKI?

 

A.

Key escrow

B.

CA

C.

Private key

D.

Recovery key

 

Correct Answer: B

 

 

QUESTION 249

Which of the following should Matt, a security administrator, include when encrypting

 

smartphones? (Select TWO).

 

A.

Steganography images

B.

Internal memory

C.

Master boot records

D.

Removable memory cards

E.

Public keys

 

Correct Answer: BD

 

 

QUESTION 250

Which of the following is the below pseudo-code an example of?

 

IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT

 

A.

Buffer overflow prevention

B.

Input validation

C.

CSRF prevention

D.

Cross-site scripting prevention

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Real Tests (July) and tagged , , , , , , . Bookmark the permalink.