Download New Updated (July) CompTIA SY0-401 Actual Test 401-410

Ensurepass

 

QUESTION 401

The process of making certain that an entity (operating system, application, etc.) is as secure as it can be is known as:

 

A.

Stabilizing

B.

Reinforcing

C.

Hardening

D.

Toughening

 

Correct Answer: C

 

 

 

 

QUESTION 402

What is the term for the process of luring someone in (usually done by an enforcement officer or a government agent)?

 

A.

Enticement

B.

Entrapment

C.

Deceit

D.

Sting

 

Correct Answer: A

 

 

QUESTION 403

Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to?

 

A.

PAP, MSCHAPv2

B.

CHAP, PAP

C.

MSCHAPv2, NTLMv2

D.

NTLM, NTLMv2

 

Correct Answer: A

 

 

QUESTION 404

Which of the following is an advantage of implementing individual file encryption on a hard drive which already deploys full disk encryption?

 

A.

Reduces processing overhead required to access the encrypted files

B.

Double encryption causes the individually encrypted files to partially lose their properties

C.

Individually encrypted files will remain encrypted when copied to external media

D.

File level access control only apply to individually encrypted files in a fully encrypted drive

 

Correct Answer: C

 

 

QUESTION 405

An IT director is looking to reduce the footprint of their company’s server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. Which of the following BEST describes this arrangement?

 

A.

Infrastructure as a Service

B.

Storage as a Service

C.

Platform as a Service

D.

Software as a Service

 

Correct Answer: A

 

 

 

 

 

QUESTION 406

A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at the site were facing the wrong direction to capture the incident. The analyst ensures the cameras are turned to face the proper direction. Which of the following types of controls is being used?


 

A.

Detective

B.

Deterrent

C.

Corrective

D.

Preventive

 

Correct Answer: C

 

 

QUESTION 407

A security administrator wishes to change their wireless network so that IPSec is built into the protocol and NAT is no longer required for address range extension. Which of the following protocols should be used in this scenario?

 

A.

WPA2

B.

WPA

C.

IPv6

D.

IPv4

 

Correct Answer: C

 

 

QUESTION 408

The network administrator is responsible for promoting code to applications on a DMZ web server. Which of the following processes is being followed to ensure application integrity?

 

A.

Applic
ation hardening

B.

Application firewall review

C.

Application change management

D.

Application patch management

 

Correct Answer: C

 

 

QUESTION 409

An IT auditor tests an application as an authenticated user. This is an example of which of the following types of testing?

 

A.

Penetration

B.

White box

C.

Black box

D.

Gray box

 

Correct Answer: D

 

 

 

 

 

QUESTION 410

The manager has a need to secure physical documents every night, since the company began enforcing the clean desk policy. The BEST solution would include: (Select TWO).

 

A.

Fire- or water-proof safe.

B.

Department door locks.

C.

Proximity card.

D.

24-hour security guard.

E.

Locking cabinets and drawers.

 

Correct Answer: AE

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in SY0-401 Real Tests (July) and tagged , , , , , , . Bookmark the permalink.