[Free] 2018(July) Dumps4cert CompTIA SY0-401 Dumps with VCE and PDF Download 371-380

By | July 17, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 371 – (Topic 2)

Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to restore those services?

  1. Hot site

  2. Warm site

  3. Cold site

  4. Mobile site

Answer: D Explanation:

Not having a dedicated site means that the mobile site can fill the role of either being a hot, warm or cold site as a disaster recovery measure.

Question No: 372 – (Topic 2)

A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?

  1. Command shell restrictions

  2. Restricted interface

  3. Warning banners

  4. Session output pipe to /dev/null

Answer: C Explanation:

Within Microsoft Windows, you have the ability to put signs (in the form of onscreen pop-up banners) that appear before the login telling similar information-authorized access only, violators will be prosecuted, and so forth. Such banners convey warnings or regulatory information to the user that they must “accept” in order to use the machine or network. You need to make staff aware that they may legally be prosecuted and a message is best given via a banner so that all staff using workstation will get notification.

Question No: 373 – (Topic 2)

Which of the following is the BEST reason to provide user awareness and training programs for organizational staff?

  1. To ensure proper use of social media

  2. To reduce organizational IT risk

  3. To detail business impact analyses

  4. To train staff on zero-days

Answer: B Explanation:

Ideally, a security awareness training program for the entire organization should cover the following areas:

Importance of security

Responsibilities of people in the organization Policies and procedures

Usage policies

Account and password-selection criteria Social engineering prevention

You can accomplish this training either by using internal staff or by hiring outside trainers. This type of training will significantly reduce the organizational IT risk.

Question No: 374 – (Topic 2)

Which of the following risk concepts requires an organization to determine the number of

failures per year?

  1. SLE

  2. ALE

  3. MTBF

  4. Quantitative analysis

Answer: B Explanation:

ALE is the annual loss expectancy value. This is a monetary measure of how much loss you could expect in a year.

Question No: 375 – (Topic 2)

A compromised workstation utilized in a Distributed Denial of Service (DDOS) attack has been removed from the network and an image of the hard drive has been created.

However, the system administrator stated that the system was left unattended for several hours before the image was created. In the event of a court case, which of the following is likely to be an issue with this incident?

  1. Eye Witness

  2. Data Analysis of the hard drive

  3. Chain of custody

  4. Expert Witness

Answer: C Explanation:

Chain of custody deals with how evidence is secured, where it is stored, and who has access to it. When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. The evidence must always be within your custody, or you’re open to dispute about possible evidence tampering.

Question No: 376 – (Topic 2)

After recovering from a data breach in which customer data was lost, the legal team meets with the Chief Security Officer (CSO) to discuss ways to better protect the privacy of

customer data.

Which of the following controls support this goal?

  1. Contingency planning

  2. Encryption and stronger access control

  3. Hashing and non-repudiation

  4. Redundancy and fault tolerance

Answer: B Explanation:

Encryption is used to protect data/contents/documents. Access control refers to controlling who accesses any data/contents/documents and to exercise authorized control to the accessing of that data.

Question No: 377 – (Topic 2)

Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company data. Where and how should Matt meet this requirement?

  1. Matt should implement access control lists and turn on EFS.

  2. Matt should implement DLP and encrypt the company database.

  3. Matt should install Truecrypt and encrypt the company server.

  4. Matt should install TPMs and encrypt the company database.

Answer: B Explanation:

Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data. Encryption is used to protect data.

Question No: 378 – (Topic 2)

An email client says a digital signature is invalid and the sender cannot be verified. The recipient is concerned with which of the following concepts?

  1. Integrity

  2. Availability

  3. Confidentiality

  4. Remediation

Answer: A Explanation:

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. The message is encrypted using the encryption system, and a second piece of information, the digital signature, is added to the message. Digital Signatures is used to validate the integrity of the message and the sender. Integrity means the message can’t be altered without detection.

Question No: 379 – (Topic 2)

A security audit identifies a number of large email messages being sent by a specific user from their company email account to another address external to the company. These messages were sent prior to a company data breach, which prompted the security audit. The user was one of a few people who had access to the leaked data. Review of the suspect’s emails show they consist mostly of pictures of the user at various locations during a recent vacation. No suspicious activities from other users who have access to the data were discovered.

Which of the following is occurring?

  1. The user is encrypting the data in the outgoing messages.

  2. The user is using steganography.

  3. The user is spamming to obfuscate the activity.

  4. The user is using hashing to embed data in the emails.

Answer: B Explanation:

Steganography is the process of hiding one message in another. Steganography may also be referred to as electronic watermarking. It is also the process of hiding a message in a medium such as a digital image, audio fi le, or other fi le. In theory, doing this prevents analysts from detecting the real message. You could encode your message in another file or message and use that file to hide your message.

Question No: 380 – (Topic 2)

A system administrator has been instructed by the head of security to protect their data at- rest.

Which of the following would provide the strongest protection?

  1. Prohibiting removable media

  2. Incorporating a full-disk encryption system

  3. Biometric controls on data center entry points

  4. A host-based intrusion detection system

Answer: B Explanation:

Full disk encryption can be used to encrypt an entire volume with 128-bit encryption. When the entire volume is encrypted, the data is not accessible to someone who might boot another operating system in an attempt to bypass the computer’s security. Full disk encryption is sometimes referred to as hard drive encryption. This would be best to protect data that is at rest.

100% Dumps4cert Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Dumps4cert Pass Guaranteed!
SY0-401 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.