P.S. Top Quality SY0-401 braindump are available on Google Drive, GET MORE: https://drive.google.com/open?id=1N2JV2ly-9-PEd0mezD-TcYgNvU4Ui_AY
Question No: 4
An incident occurred when an outside attacker was able to gain access to network resources. During the incident response, investigation security logs indicated multiple failed login attempts for a network administrator. Which of the following controls, if in place could have BEST prevented this successful attack?
A. Password history
B. Password complexity
C. Account lockout
D. Account expiration
Answer: C
Question No: 5
An assessment too reports that the companyu2021s web server may be susceptible to remote buffer overflow. The web server administrator insists that the finding is a false positive. Which of the following should the administrator do to verify if this is indeed a false positive?
A. Use a banner grabbing tool
B. Run a vulnerability scan
C. Enforce company policies
D. Perform a penetration test
Answer: B
Question No: 6
After making a bit-level copy of compromised server, the forensics analyst Joe wants to verify that he bid not accidentally make a change during his investigation. Which of the following should he perform?
A. Take a hash of the image and compare it to the one being investigated
B. Compare file sizes of all files prior to and after investigation
C. Make a third image and compare it to the second image being investigated
D. Compare the logs of the copy to the actual server
Answer: A
Question No: 7
A video surveillance audit recently uncovered that an employee plugged in a personal laptop and used the corporate network to browse inappropriate and potentially malicious websites after office hours. Which of the following could BEST prevent a situation like this form occurring again?
A. Intrusion detection
B. Content filtering
C. Port security
D. Vulnerability scanning
Answer: C
Question No: 8
A datacenter has suffered repeated burglaries which led to equipment theft and arson. In the past, the thieves have demonstrated a determination to bypass any installed safeguards. After mantraps were installed to prevent tailgating, the thieves crashed through the wall of datacenter with a vehicle after normal business hours. Which of the following options could improve the safety and security of the datacenter further? (Select two)
A. Cipher locks
B. CCTV
C. Escape routes
D. K rated fencing
E. Fm200 fire suppression
Answer: A,D
Question No: 9
An employee in the accounting department recently received a phishing email that instructed them to click a link in the email to view an important message from the IRS which threatened penalties if a response was not received by the end of the business day. The employee clicked on the link and the machine was infected with malware. Which of the following principles BEST describes why this social engineering ploy was successful?
A. Scarcity
B. Familiarity
C. Social proof
D. Urgency
Answer: A
Question No: 10
A bank is planning to implement a third factor to protect customer ATM transactions. Which of the following could the bank implement?
A. SMS
B. Fingerprint
C. Chip and Pin
D. OTP
Answer: C
Question No: 11
The administrator installs database software to encrypt each field as it is written to disk. Which of the following describes the encrypted data?
A. In-transit
B. In-use
C. Embedded
D. At-rest
Answer: B
Question No: 12
An administrator is implementing a new management system for the machinery on the companyu2021s production line. One requirement is that the system only be accessible while within the production facility. Which of the following will be the MOST effective solution in limiting access based on this requirement?
A. Access control list
B. Firewall policy
C. Air Gap
D. MAC filter
Answer: A
Question No: 13
A remote user (User1) is unable to reach a newly provisioned corporate windows workstation. The system administrator has been given the following log files from the VPN, corporate firewall and workstation host.
Which of the following is preventing the remote user from being able to access the workstation?
A. Network latency is causing remote desktop service request to time out
B. User1 has been locked out due to too many failed passwords
C. Lack of network time synchronization is causing authentication mismatches
D. The workstation has been compromised and is accessing known malware sites
E. The workstation host firewall is not allowing remote desktop connections
Answer: B
100% Up to the minute CompTIA SY0-401 Questions & Answers shared by Surepassexam, Get HERE: https://www.surepassexam.com/SY0-401-exam-dumps.html (New 1781 Q&As)