[Free] 2018(July) Dumps4cert CompTIA SY0-401 Dumps with VCE and PDF Download 441-450

By | July 17, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 441 – (Topic 2)

Customers’ credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future?

  1. Application firewalls

  2. Manual updates

  3. Firmware version control

  4. Encrypted TCP wrappers

Answer: D Explanation:

Wrapping sensitive systems with a specific control is required when protecting data in transit. TCP wrappers are also security controls. TCP Wrapper is a host-based networking ACL system, used to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows host or subnetwork IP addresses, names and/or inetd query replies, to be used as tokens on which to filter for access control purposes.

TCP Wrapper should not be considered a replacement for a properly configured firewall. Instead, TCP Wrapper should be used in conjunction with a firewall and other security enhancements in order to provide another layer of protection in the implementation of a security policy.

Question No: 442 – (Topic 2)

Which of the following is the LEAST volatile when performing incident response procedures?

  1. Registers

  2. RAID cache

  3. RAM

  4. Hard drive

Answer: D Explanation:

An example of OOV in an investigation may be RAM, hard drive data, CDs/DVDs, and printouts. Of the options stated in the question the hard drive would be the least volatile.

Question No: 443 – (Topic 2)

A user has received an email from an external source which asks for details on the company’s new product line set for release in one month. The user has a detailed spec sheet but it is marked quot;Internal Proprietary Informationquot;. Which of the following should the user do NEXT?

  1. Contact their manager and request guidance on how to best move forward

  2. Contact the help desk and/or incident response team to determine next steps

  3. Provide the requestor with the email information since it will be released soon anyway

  4. Reply back to the requestor to gain their contact information and call them

Answer: B Explanation:

This is an incident that has to be responded to by the person who discovered it- in this case the user. An incident is any attempt to violate a security policy, a successful penetration, a compromise of a system, or any unauthorized access to information. It’s important that an incident response policy establish at least the following items:

Outside agencies that should be contacted or notified in case of an incident Resources used to deal with an incident

Procedures to gather and secure evidence

List of information that should be collected about an incident Outside experts who can be used to address issues if needed Policies and guidelines regarding how to handle an incident

Since the spec sheet has been marked Internal Proprietary Information the user should refer the incident to the incident response team.

Question No: 444 – (Topic 2)

After a production outage, which of the following documents contains detailed information on the order in which the system should be restored to service?

  1. Succession planning

  2. Disaster recovery plan

  3. Information security plan

  4. Business impact analysis

Answer: B Explanation:

A disaster-recovery plan, or scheme, helps an organization respond effectively when a disaster occurs. Disasters may include system failure, network failure, infrastructure failure, and natural disaster. The primary emphasis of such a plan is reestablishing services and minimizing losses.

Question No: 445 – (Topic 2)

Establishing a published chart of roles, responsibilities, and chain of command to be used during a disaster is an example of which of the following?

  1. Fault tolerance

  2. Succession planning

  3. Business continuity testing

  4. Recovery point objectives

Answer: B Explanation:

Succession planning outlines those internal to the organization that has the ability to step into positions when they open. By identifying key roles that cannot be left unfilled and associating internal employees who can step into these roles, you can groom those employees to make sure that they are up to speed when it comes time for them to fill those positions.

Question No: 446 – (Topic 2)

A security engineer is given new application extensions each month that need to be secured prior to implementation. They do not want the new extensions to invalidate or interfere with existing application security. Additionally, the engineer wants to ensure that the new requirements are approved by the appropriate personnel. Which of the following should be in place to meet these two goals? (Select TWO).

  1. Patch Audit Policy

  2. Change Control Policy

  3. Incident Management Policy

  4. Regression Testing Policy

  5. Escalation Policy

  6. Application Audit Policy

Answer: B,D Explanation:

A backout (regression testing) is a reversion from a change that had negative consequences. It could be, for example, that everything was working fi ne until you installed a service pack on a production machine, and then services that were normally available were no longer accessible. The backout, in this instance, would revert the system to the state that it was in before the service pack was applied. Backout plans can include uninstalling service packs, hotfi xes, and patches, but they can also include reversing a migration and using previous firmware. A key component to creating such a plan is identifying what events will trigger your implementing the backout.

A change control policy refers to the structured approach that is followed to secure a company’s assets in the event of changes occurring.

Question No: 447 – (Topic 2)

A datacenter requires that staff be able to identify whether or not items have been removed from the facility. Which of the following controls will allow the organization to provide automated notification of item removal?

  1. CCTV

  2. Environmental monitoring

  3. RFID

  4. EMI shielding

Answer: C Explanation:

RFID is radio frequency identification that works with readers that work with 13.56 MHz smart cards and 125 kHz proximity cards and can open turnstiles, gates, and any other physical security safeguards once the signal is read. Fitting out the equipment with RFID will allow you to provide automated notification of item removal in the event of any of the equipped items is taken off the premises.

Question No: 448 – (Topic 2)

Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network?

  1. Cross-platform compatibility issues between personal devices and server-based applications

  2. Lack of controls in place to ensure that the devices have the latest system patches and signature files

  3. Non-corporate devices are more difficult to locate when a user is terminated

  4. Non-purchased or leased equipment may cause failure during the audits of company- owned assets

Answer: B Explanation:

With employees who want to bring their own devices you will have to make them understand why they cannot. You do not want them plugging in a flash drive, let alone a camera, smartphone, tablet computer, or other device, on which company fi les could get intermingled with personal files. Allowing this to happen can create situations where data can leave the building that shouldn’t as well as introduce malware to the system.

Employees should not sync unauthorized smartphones to their work systems. Some smartphones use multiple wireless spectrums and unwittingly open up the possibility for an attacker in the parking lot to gain access through the phone to the internal network. Thus if you do not have controls in place then your network is definitely at risk.

Question No: 449 – (Topic 2)

Several employees submit the same phishing email to the administrator. The administrator finds that the links in the email are not being blocked by the company’s security device.

Which of the following might the administrator do in the short term to prevent the emails from being received?

  1. Configure an ACL

  2. Implement a URL filter

  3. Add the domain to a block list

  4. Enable TLS on the mail server

Answer: C Explanation:

Blocking e-mail is the same as preventing the receipt of those e-mails and this is done by applying a filter. But the filter must be configured to block it. Thus you should add that specific domain from where the e-mails are being sent to the list of addresses that is to be blocked.

Question No: 450 – (Topic 2)

A large bank has moved back office operations offshore to another country with lower wage costs in an attempt to improve profit and productivity. Which of the following would be a customer concern if the offshore staff had direct access to their data?

  1. Service level agreements

  2. Interoperability agreements

  3. Privacy considerations

  4. Data ownership

Answer: C Explanation:

Businesses such as banks have legally mandated privacy requirements and with moving operations offshore there is decentralized control with has implications for privacy of data.

100% Dumps4cert Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Dumps4cert Pass Guaranteed!
SY0-401 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.