[Free] 2018(July) Dumps4cert CompTIA SY0-401 Dumps with VCE and PDF Download 231-240

By | July 17, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 231 – (Topic 2)

An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims

she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?

  1. CRL

  2. Non-repudiation

  3. Trust models

  4. Recovery agents

Answer: B Explanation:

Nonrepudiation prevents one party from denying actions they carried out. This means that the identity of the email sender will not be repudiated.

Question No: 232 – (Topic 2)

Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed?

  1. Bollards

  2. Video surveillance

  3. Proximity readers

  4. Fencing

Answer: B Explanation:

Video surveillance is making use of a camera, or CCTV that is able to record everything it sees and is always running. This way you will be able to check exactly who enters secure areas.

Question No: 233 – (Topic 2)

A company wants to ensure that its hot site is prepared and functioning. Which of the following would be the BEST process to verify the backup datacenter is prepared for such a scenario?

  1. Site visit to the backup data center

  2. Disaster recovery plan review

  3. Disaster recovery exercise

  4. Restore from backup

Answer: C Explanation:

A hot site is a location that can provide operations within hours of a failure. This type of site would have servers, networks, and telecommunications equipment in place to reestablish service in a short time. Hot sites provide network connectivity, systems, and preconfigured software to meet the needs of an organization. This means that an actual exercise run would test the abilities of your hot site best.

Question No: 234 – (Topic 2)

The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and Standard Operating Procedures documentation in order to successfully respond to future incidents. Which of the following stages of the Incident Handling process is the team working on?

  1. Lessons Learned

  2. Eradication

  3. Recovery

  4. Preparation

Answer: D Explanation:

Incident response procedures involves: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Developing and updating all internal operating and standard operating procedures documentation to handle future incidents is preparation.

Question No: 235 – (Topic 2)

Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?

  1. Business continuity planning

  2. Continuity of operations

  3. Business impact analysis

  4. Succession planning

Answer: D Explanation:

Succession planning outlines those internal to the organization who have the ability to step into positions when they open. By identifying key roles that cannot be left unfilled and associating internal employees who can step into these roles, you can groom those employees to make sure that they are up to speed when it comes time for them to fill those positions.

Question No: 236 – (Topic 2)

Which of the following is the primary security concern when deploying a mobile device on a network?

  1. Strong authentication

  2. Interoperability

  3. Data security

  4. Cloud storage technique

Answer: C Explanation:

Mobile devices, such as laptops, tablet computers, and smartphones, provide security challenges above those of desktop workstations, servers, and such in that they leave the office and this increases the odds of their theft which makes data security a real concern. At a bare minimum, the following security measures should be in place on mobile devices: Screen lock, Strong password, Device encryption, Remote Wipe or Sanitation, voice encryption, GPS tracking, Application control, storage segmentation, asses tracking and device access control.

Question No: 237 – (Topic 2)

In order to secure additional budget, a security manager wants to quantify the financial

impact of a one-time compromise. Which of the following is MOST important to the security manager?

  1. Impact

  2. SLE

  3. ALE

  4. ARO

Answer: B Explanation:

SLE is a monetary value, and it represents how much you expect to lose at any one time: the single loss expectancy. SLE can be divided into two components: AV (asset value) and the EF (exposure factor). Thus a one-time compromise would resort under the SLE for the security manager.

Question No: 238 – (Topic 2)

Which of the following controls would prevent an employee from emailing unencrypted information to their personal email account over the corporate network?

  1. DLP

  2. CRL

  3. TPM

  4. HSM

Answer: A Explanation:

Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data.

Question No: 239 – (Topic 2)

The manager has a need to secure physical documents every night, since the company began enforcing the clean desk policy. The BEST solution would include: (Select TWO).

  1. Fire- or water-proof safe.

  2. Department door locks.

  3. Proximity card.

  4. 24-hour security guard.

  5. Locking cabinets and drawers.

Answer: A,E Explanation:

Using a safe and locking cabinets to protect backup media, documentation, and any other physical artifacts that could do harm if they fell into the wrong hands would form part of keeping employees desks clean as in a clean desk policy.

Question No: 240 – (Topic 2)

A malicious person gained access to a datacenter by ripping the proximity badge reader off the wall near the datacenter entrance. This caused the electronic locks on the datacenter door to release because the:

  1. badge reader was improperly installed.

  2. system was designed to fail open for life-safety.

  3. system was installed in a fail closed configuration.

  4. system used magnetic locks and the locks became demagnetized.

Answer: B Explanation:

It describes a design the lock to fail open for life safety, causing the door to stay open when power is lost – in this case the proximity badge reader was ripped off the wall.

100% Dumps4cert Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Dumps4cert Pass Guaranteed!
SY0-401 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.