SY0-401 Latest Exam (May 2018)

[Free] 2018(May) EnsurePass Pass4sure CompTIA SY0-401 Dumps with VCE and PDF 821-830

May 2, 2018 : Ensure you pass the IT Exams
2018 May CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 821 – (Topic 4)

To protect corporate data on removable media, a security policy should mandate that all removable devices use which of the following?

  1. Full disk encryption

  2. Application isolation

  3. Digital rights management

  4. Data execution prevention

Answer: A Explanation:

Full-disk encryption encrypts the data on the hard drive of the device or on a removable drive. This feature ensures that the data on the device or removable drive cannot be accessed in a useable form should it be stolen.

Question No: 822 – (Topic 4)

Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).

  1. Tethering

  2. Screen lock PIN

  3. Remote wipe

  4. Email password

  5. GPS tracking

  6. Device encryption

Answer: C,F Explanation:

C: Remote wipe is the process of deleting data on a device in the event that the device is stolen. This is performed over remote connections such as the mobile phone service or the internet connection and helps ensure that sensitive data is not accessed by unauthorized people.

F: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen.

Question No: 823 – (Topic 4)

A security administrator wants to deploy security controls to mitigate the threat of company employees’ personal information being captured online. Which of the following would BEST serve this purpose?

  1. Anti-spyware

  2. Antivirus

  3. Host-based firewall

  4. Web content filter

Answer: A Explanation:

Spyware monitors a user’s activity and uses network protocols to reports it to a third party without the user’s knowledge. This is usually accomplished using a tracking cookie.

Question No: 824 – (Topic 4)

Which of the following is a common coding error in which boundary checking is not performed?

  1. Input validation

  2. Fuzzing

  3. Secure coding

  4. Cross-site scripting

Answer: A Explanation:

Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain.

Question No: 825 – (Topic 4)

Which of the following practices is used to mitigate a known security vulnerability?

  1. Application fuzzing

  2. Patch management

  3. Password cracking

  4. Auditing security logs

Answer: B Explanation:

Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps protect a systems from new attacks and vulnerabilities that have recently become known.

Question No: 826 – (Topic 4)

Which of the following solutions provides the most flexibility when testing new security controls prior to implementation?

  1. Trusted OS

  2. Host software baselining

  3. OS hardening

  4. Virtualization

Answer: D Explanation:

Virtualization is used to host one or more operating systems in the memory of a single host computer and allows multiple operating systems to run simultaneously on the same hardware. Virtualization offers the flexibility of quickly and easily making backups of entire virtual systems, and quickly recovering the virtual system when errors occur. Furthermore, malicious code compromises of virtual systems rarely affect the host system, which allows for safer testing and experimentation.

Question No: 827 – (Topic 4)

A small company has recently purchased cell phones for managers to use while working outside if the office.

The company does not currently have a budget for mobile device management and is primarily concerned with deterring leaks if sensitive information obtained by unauthorized access to unattended phones. Which of the following would provide the solution BEST meets the company’s requirements?

  1. Screen-lock

  2. Disable removable storage

  3. Full device encryption

  4. Remote wiping

Answer: A

Explanation: Explanation

Screen-lock is a security feature that requires the user to enter a password after a short period of inactivity before they can access the system again. This feature ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications.

Question No: 828 – (Topic 4)

Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table?

  1. Full disk

  2. Individual files

  3. Database

  4. Removable media

Answer: C Explanation:

A table is stored in a database. Database encryption makes use of cryptography functions that are built into the database software to encrypt the data stored in the database. This often offers granular encryption options which allows for the encryptions of the entire database, specific database tables, or specific database fields, such as a credit card number field.

Question No: 829 – (Topic 4)

The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity.

Which of the following would be MOST effective for preventing this behavior?

  1. Acceptable use policies

  2. Host-based firewalls

  3. Content inspection

  4. Application whitelisting

Answer: D Explanation:

Application whitelisting is a form of application security which prevents any software from running on a system unless it is included on a preapproved exception list.

Question No: 830 – (Topic 4)

Which of the following types of encryption will help in protecting files on a PED?

  1. Mobile device encryption

  2. Transport layer encryption

  3. Encrypted hidden container

  4. Database encryption

Answer: A Explanation:

Device encryption encrypts the data on a Personal Electronic Device (PED). This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen.

100% Ensurepass Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Ensurepass Free Guaranteed!
SY0-401 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No