EnsurePass
2018 Jan CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/SY0-401.html
CompTIA Security Certification
Question No: 231 – (Topic 2)
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims
she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?
-
CRL
-
Non-repudiation
-
Trust models
-
Recovery agents
Answer: B Explanation:
Nonrepudiation prevents one party from denying actions they carried out. This means that the identity of the email sender will not be repudiated.
Question No: 232 – (Topic 2)
Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed?
-
Bollards
-
Video surveillance
-
Proximity readers
-
Fencing
Answer: B Explanation:
Video surveillance is making use of a camera, or CCTV that is able to record everything it sees and is always running. This way you will be able to check exactly who enters secure areas.
Question No: 233 – (Topic 2)
A company wants to ensure that its hot site is prepared and functioning. Which of the following would be the BEST process to verify the backup datacenter is prepared for such a scenario?
-
Site visit to the backup data center
-
Disaster recovery plan review
-
Disaster recovery exercise
-
Restore from backup
Answer: C Explanation:
A hot site is a location that can provide operations within hours of a failure. This type of site would have servers, networks, and telecommunications equipment in place to reestablish service in a short time. Hot sites provide network connectivity, systems, and preconfigured software to meet the needs of an organization. This means that an actual exercise run would test the abilities of your hot site best.
Question No: 234 – (Topic 2)
The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and Standard Operating Procedures documentation in order to successfully respond to future incidents. Which of the following stages of the Incident Handling process is the team working on?
-
Lessons Learned
-
Eradication
-
Recovery
-
Preparation
Answer: D Explanation:
Incident response procedures involves: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Developing and updating all internal operating and standard operating procedures documentation to handle future incidents is preparation.
Question No: 235 – (Topic 2)
Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?
-
Business continuity planning
-
Continuity of operations
-
Business impact analysis
-
Succession planning
Answer: D Explanation:
Succession planning outlines those internal to the organization who have the ability to step into positions when they open. By identifying key roles that cannot be left unfilled and associating internal employees who can step into these roles, you can groom those employees to make sure that they are up to speed when it comes time for them to fill those positions.
Question No: 236 – (Topic 2)
Which of the following is the primary security concern when deploying a mobile device on a network?
-
Strong authentication
-
Interoperability
-
Data security
-
Cloud storage technique
Answer: C Explanation:
Mobile devices, such as laptops, tablet computers, and smartphones, provide security challenges above those of desktop workstations, servers, and such in that they leave the office and this increases the odds of their theft which makes data security a real concern. At a bare minimum, the following security measures should be in place on mobile devices: Screen lock, Strong password, Device encryption, Remote Wipe or Sanitation, voice encryption, GPS tracking, Application control, storage segmentation, asses tracking and device access control.
Question No: 237 – (Topic 2)
In order to secure additional budget, a security manager wants to quantify the financial
impact of a one-time compromise. Which of the following is MOST important to the security manager?
-
Impact
-
SLE
-
ALE
-
ARO
Answer: B Explanation:
SLE is a monetary value, and it represents how much you expect to lose at any one time: the single loss expectancy. SLE can be divided into two components: AV (asset value) and the EF (exposure factor). Thus a one-time compromise would resort under the SLE for the security manager.
Question No: 238 – (Topic 2)
Which of the following controls would prevent an employee from emailing unencrypted information to their personal email account over the corporate network?
-
DLP
-
CRL
-
TPM
-
HSM
Answer: A Explanation:
Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data.
Question No: 239 – (Topic 2)
The manager has a need to secure physical documents every night, since the company began enforcing the clean desk policy. The BEST solution would include: (Select TWO).
-
Fire- or water-proof safe.
-
Department door locks.
-
Proximity card.
-
24-hour security guard.
-
Locking cabinets and drawers.
Answer: A,E Explanation:
Using a safe and locking cabinets to protect backup media, documentation, and any other physical artifacts that could do harm if they fell into the wrong hands would form part of keeping employees desks clean as in a clean desk policy.
Question No: 240 – (Topic 2)
A malicious person gained access to a datacenter by ripping the proximity badge reader off the wall near the datacenter entrance. This caused the electronic locks on the datacenter door to release because the:
-
badge reader was improperly installed.
-
system was designed to fail open for life-safety.
-
system was installed in a fail closed configuration.
-
system used magnetic locks and the locks became demagnetized.
Answer: B Explanation:
It describes a design the lock to fail open for life safety, causing the door to stay open when power is lost – in this case the proximity badge reader was ripped off the wall.
100% Free Download!
–Download Free Demo:SY0-401 Demo PDF
100% Pass Guaranteed!
–Download 2018 EnsurePass SY0-401 Full Exam PDF and VCE
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
2018 EnsurePass IT Certification PDF and VCE
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF