Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
SY0-401 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Passguide CompTIA SY0-401 Dumps with VCE and PDF 391-400

September 20, 2017

EnsurePass
2017 Sep CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/SY0-401.html

CompTIA Security Certification

Question No: 391 – (Topic 2)

Which of the following security awareness training is BEST suited for data owners who are concerned with protecting the confidentiality of their data?

  1. Social networking use training

  2. Personally owned device policy training

  3. Tailgating awareness policy training

  4. Information classification training

Answer: D Explanation:

Information classification is done by confidentiality and comprises of three categories, namely: public use, internal use and restricted use. Knowing these categories and how to handle data according to its category is essential in protecting the confidentiality of the data.

Question No: 392 – (Topic 2)

Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?

  1. Restoration and recovery strategies

  2. Deterrent strategies

  3. Containment strategies

  4. Detection strategies

Answer: C Explanation:

Containment strategies is used to limit damages, contain a loss so that it may be controlled, much like quarantine, and loss incident isolation.

Question No: 393 – (Topic 2)

A network administrator has recently updated their network devices to ensure redundancy is in place so that:

  1. switches can redistribute routes across the network.

  2. environmental monitoring can be performed.

  3. single points of failure are removed.

  4. hot and cold aisles are functioning.

Answer: C Explanation:

Redundancy refers to systems that either are duplicated or fail over to other systems in the event of a malfunction. The best way to remove an SPOF from your environment is to add redundancy.

Question No: 394 DRAG DROP – (Topic 2)

Drag the items on the left to show the different types of security for the shown devices. Not all fields need to be filled. Not all items need to be used.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Mobile Device Security GPS tracking

Remote wipe Device Encryption Strong password

Server in Data Center Security FM-200

Biometrics Proximity Badges Mantrap

For mobile devices, at bare minimum you should have the following security measures in place: Screen lock, Strong password, Device encryption, Remote wipe/Sanitation, voice encryption, GPS tracking, Application control, Storage segmentation, Asset tracking as well as Device Access control.

For servers in a data center your security should include: Fire extinguishers such as FM200 as part of fire suppression; Biometric, proximity badges, mantraps, HVAC, cable locks; these can all be physical security measures to control access to the server.

References:

Dulaney, Emmett and Chuck Eastton, CompTIA Security Study Guide, 6th Edition, Sybex, Indianapolis, 2014, p. 418

Question No: 395 – (Topic 2)

Joe, the system administrator, has been asked to calculate the Annual Loss Expectancy (ALE) for a $5,000 server, which often crashes. In the past year, the server has crashed 10 times, requiring a system reboot to recover with only 10% loss of data or function. Which of the following is the ALE of this server?

A. $500

B. $5,000 C. $25,000 D. $50,000

Answer: B

Explanation:

SLE 脳 ARO = ALE, where SLE is equal to asset value (AV) times exposure factor (EF); and ARO is the annualized rate of occurrence.

(5000 x 10) x 0.1 = 5000

Question No: 396 – (Topic 2)

A server dedicated to the storage and processing of sensitive information was compromised with a rootkit and sensitive data was extracted. Which of the following incident response procedures is best suited to restore the server?

  1. Wipe the storage, reinstall the OS from original media and restore the data from the last known good backup.

  2. Keep the data partition, restore the OS from the most current backup and run a full system antivirus scan.

  3. Format the storage and reinstall both the OS and the data from the most current backup.

  4. Erase the storage, reinstall the OS from most current backup and only restore the data that was not compromised.

Answer: A Explanation:

Rootkits are software programs that have the ability to hide certain things from the operating system. With a rootkit, there may be a number of processes running on a system that do not show up in Task Manager or connections established or available that do not appear in a netstat display-the rootkit masks the presence of these items. The rootkit is able to do this by manipulating function calls to the operating system and filtering out information that would normally appear. Theoretically, rootkits could hide anywhere that there is enough memory to reside: video cards, PCI cards, and the like. The best way to handle this situation is to wipe the server and reinstall the operating system with the original installation disks and then restore the extracted data from your last known good backup. This way you can eradicate the rootkit and restore the data.

Question No: 397 – (Topic 2)

Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group. Which of the following would prevent her from denying accountability?

  1. Email Encryption

  2. Steganography

  3. Non Repudiation

  4. Access Control

Answer: C Explanation:

Nonrepudiation prevents one party from denying actions they carried out.

Question No: 398 – (Topic 2)

Several departments within a company have a business need to send high volumes of confidential information to customers via email. Which of the following is the BEST solution to mitigate unintentional exposure of confidential information?

  1. Employ encryption on all outbound emails containing confidential information.

  2. Employ exact data matching and prevent inbound emails with Data Loss Prevention.

  3. Employ hashing on all outbound emails containing confidential information.

  4. Employ exact data matching and encrypt inbound e-mails with Data Loss Prevention.

Answer: A Explanation:

Encryption is used to ensure the confidentiality of information and in this case the outbound email that contains the confidential information should be encrypted.

Question No: 399 – (Topic 2)

Which of the following is an attack vector that can cause extensive physical damage to a datacenter without physical access?

  1. CCTV system access

  2. Dial-up access

  3. Changing environmental controls

  4. Ping of death

Answer: C Explanation:

Environmental systems include heating, air conditioning, humidity control, fire suppression, and power systems. All of these functions are critical to a well-designed physical plant. A computer room will typically require full-time environmental control. Changing any of these controls (when it was set to its optimum values) will result in damage.

Question No: 400 – (Topic 2)

Matt, a security administrator, wants to ensure that the message he is sending does not get intercepted or modified in transit. This concern relates to which of the following concepts?

  1. Availability

  2. Integrity

  3. Accounting

  4. Confidentiality

Answer: B Explanation:

Integrity means ensuring that data has not been altered. Hashing and message authentication codes are the most common methods to accomplish this. In addition, ensuring nonrepudiation via digital signatures supports integrity.

100% Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass SY0-401 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE