SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(39225 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA SY0-401 Free Practice Questions

P.S. Validated SY0-401 questions are available on Google Drive, GET MORE: https://drive.google.com/open?id=1siHiDBDsDihbfL-IfduKM7eRtxwHmXbW


New CompTIA SY0-401 Exam Dumps Collection (Question 10 - Question 19)

New Questions 10

During a company-wide initiative to harden network security, it is discovered that end users who have laptops cannot be removed from the local administrator group. Which of the following could be used to help mitigate the risk of these machines becoming compromised?

A. Security log auditing

B. Firewalls

C. HIPS

D. IDS

Answer: B


New Questions 11

The data backup window has expanded into the morning hours and has begun to affect production users. The main bottleneck in the process is the time it takes to replicate the backups to separate severs at the offsite data center. Which of the following uses of deduplication could be implemented to reduce the backup window?

A. Implement deduplication at the network level between the two locations

B. Implement deduplication on the storage array to reduce the amount of drive space needed

C. Implement deduplication on the server storage to reduce the data backed up

D. Implement deduplication on both the local and remote servers

Answer: B


New Questions 12

Which of the following is considered the MOST effective practice when securing printers or scanners in an enterprise environment?

A. Routine vulnerability scanning of peripherals

B. Install in a hardened network segment

C. Turn off the power to the peripherals at night

D. Enable print sharing only from workstations

Answer: A


New Questions 13

An organization relies heavily on an application that has a high frequency of security updates. At present, the security team only updates the application the security updates

are released as often as twice a week. Which of the following would be the BEST method of updating this application?

A. Configure testing and automate patch management for the application

B. Configure security control testing for the application

C. Manually apply updates for application when they are released

D. Configure a sandbox for testing patches before the scheduled monthly update

Answer: C


New Questions 14

A network technician at a company, Joe is working on a network device. He creates a rule to prevent users from connecting to a toy website during the holiday shopping season. This website is blacklisted and is known to have SQL injections and malware. Which of the following has been implemented?

A. Mandatory access

B. Network separation

C. Firewall rules

D. Implicit Deny

Answer: D


New Questions 15

Joe an end user has received a virus detection warning. Which of the following is the first course of action that should be taken?

A. Recovery

B. Reporting

C. Remediation

D. Identification

Answer: B


New Questions 16

A company has had their web application become unavailable several times in the past few months due to increased demand. Which of the following should the company perform to increase availability?

A. Implement a web application firewall to prevent DDoS attacksu2021

B. Configure the firewall to work with the IPS to rate limit customer requests

C. Implement a load balancer to distribute traffic based on back end server utilization

D. Configure the web server to detect race conditions and automatically restart the web services

Answer: C


New Questions 17

A BYOD policy in which employees are able to access the wireless guest network is in effect in an organization. Some users however are using the Ethernet port in personal laptops to the wired network. Which of the following could an administrator use to ensure that unauthorized devices are not allowed to access the wired network?

A. VLAN access rules configured to reject packets originating from unauthorized devices

B. Router access lists configured to block the IP addresses of unauthorized devices

C. Firewall rules configured to block the MAC addresses of unauthorized devices

D. Port security configured shut down the port when unauthorized devices connect

Answer: D


New Questions 18

A company is deploying a new VoIP phone system. They require 99.999% uptime for their phone service and are concerned about their existing data network interfering with the VoIP phone system. The core switches in the existing data network are almost fully saturated. Which of the following options will pro-vide the best performance and availability for both the VoIP traffic, as well as the traffic on the existing data network?

A. Put the VoIP network into a different VLAN than the existing data network.

B. Upgrade the edge switches from 10/100/1000 to improve network speed

C. Physically separate the VoIP phones from the data network

D. Implement flood guards on the data network

Answer: A


New Questions 19

Which of the following attacks is generally initiated from a botnet?

A. Cross site scripting attack

B. HTTP header injection

C. Distributed denial of service

D. A war driving attack

Answer: C


100% Avant-garde CompTIA SY0-401 Questions & Answers shared by Certleader, Get HERE: https://www.certleader.com/SY0-401-dumps.html (New 1781 Q&As)