Subscribed unsubscribe Subscribe Subscribe

CompTIA SY0-401 Exam Download - 100% Free VCE Files

CompTIA SY0-401 Exam Download with 100% Free VCE Files

CompTIA SY0-401 Exam Download - 100% Free VCE Files

Do not you know how to choose the CompTIA SY0-401 exam dumps? Being worried about your CompTIA SY0-401 exam? Just try Flydumps new version CompTIA SY0-401 exam dumps.High pass rate and money back guarantee!




An administrator needs to secure RADIUS traffic between two servers. Which of the following is the BEST solution?
A. Require IPSec with AH between the servers
B. Require the message-authenticator attribute for each message
C. Use MSCHAPv2 with MPPE instead of PAP D. Require a long and complex shared secret for the servers
Correct Answer: A Explanation
A recent audit has revealed weaknesses in the process of deploying new servers and network devices. Which of the following practices could be used to increase the security posture during deployment? (Select TWO).
A. Deploy a honeypot
B. Disable unnecessary services
C. Change default passwords
D. Implement an application firewall
E. Penetration testing
Correct Answer: BC Explanation
Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save money while providing valuable services. She is looking for a cost- effective solution to assist in capacity planning as well as visibility into the performance of the network. Which of the following cloud technologies should she look into?
A. IaaS
B. MaaS
C. SaaS
D. PaaS
Correct Answer: B Explanation
Which of the following is the BEST reason for placing a password lock on a mobile device?
A. Prevents an unauthorized user from accessing owner's data
B. Enables remote wipe capabilities
C. Stops an unauthorized user from using the device again
D. Prevents an unauthorized user from making phone calls
Correct Answer: A Explanation
When performing the daily review of the system vulnerability scans of the network Joe, the administrator, noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe researches the assigned vulnerability identification number from the vendor website. Joe proceeds with applying the recommended solution for identified vulnerability. Which of the following is the type of vulnerability described?
A. Network based
C. Signature based
D. Host based
Correct Answer: C Explanation
Joe is the accounts payable agent for ABC Company. Joe has been performing accounts payable function for the ABC Company without any supervision. Management has noticed several new accounts without billing invoices that were paid. Which of the following is the BEST management option for review of the new accounts?
A. Mandatory vacation
B. Job rotation
C. Separation of duties
D. Replacement
Correct Answer: A Explanation


comptia SY0-401exam



Ann, the network administrator, is receiving reports regarding a particular wireless network in the building. The network was implemented for specific machines issued to the developer department, but the developers are stating that they are having connection issues as well as slow bandwidth. Reviewing the wireless router's logs, she sees that devices not belonging to the developers are connecting to the access point. Which of the following would BEST alleviate the developer's reports?
A. Configure the router so that wireless access is based upon the connecting device's hardware address.
B. Modify the connection's encryption method so that it is using WEP instead of WPA2.
C. Implement connections via secure tunnel with additional software on the developer's computers.
D. Configure the router so that its name is not visible to devices scanning for wireless networks.
Correct Answer: A Explanation
Joe analyzed the following log and determined the security team should implement which of the following as a mitigation method against further attempts?
[00:00:01]Successful Login: 015 : local
[00:00:03]Unsuccessful Login: 022 :RDP
[00:00:04]UnSuccessful Login: 010 :RDP
[00:00:07]UnSuccessful Login: 007 :RDP
 Login: 003 :RDP



Monitor system logs


Correct Answer: D Explanation QUESTION 54
Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive client files had risen far above normal. Which of the following kind of IDS is in use?
A. Protocol based
B. Heuristic based
C. Signature based
D. Anomaly based
Correct Answer: D Explanation

ATTENTION: Get your CompTIA SY0-401 certification easily with,Flydumps latest CompTIA SY0-401 exam dumps. All the up-to-date questions and answers were added to the new version.Go to the site to get more CompTIA SY0-401 exam information.

Read More: