Update CompTIA Security+ SY0-401 Dumps with VCE and PDF for Free (Question 1751 – Question 1760)

PassLeader released the NEWEST CompTIA SY0-401 exam dumps recently! Both SY0-401 VCE dumps and SY0-401 PDF dumps are available on PassLeader, either SY0-401 VCE dumps or SY0-401 PDF dumps have the NEWEST SY0-401 exam questions in it, they will help you passing CompTIA SY0-401 exam easily! You can download the valid SY0-401 dumps VCE and PDF from PassLeader here: https://www.passleader.com/sy0-401.html (1868 Q&As Dumps)

Also, previewing the NEWEST PassLeader SY0-401 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpcG9CWHp3bXlNTTg

Which of the following allows an application to securely authenticate a user by receiving credentials from a web domain?

C.    Kerberos
D.    SAML

Answer: D

A network technician is trying to determine the source of an ongoing network based attack. Which of the following should the technician use to view IPv4 packet data on a particular internal network segment?

A.    Proxy
B.    Protocol analyzer
C.    Switch
D.    Firewall

Answer: B

The security administrator has noticed cars parking just outside of the building fence line. Which of the following security measures can the administrator use to help protect the company’s WiFi network against war driving? (Select TWO.)

A.    Create a honeynet
B.    Reduce beacon rate
C.    Add false SSIDs
D.    Change antenna placement
E.    Adjust power level controls
F.    Implement a warning banner

Answer: DE

A security administrator suspects that data on a server has been exhilarated as a result of unauthorized remote access. Which of the following would assist the administrator in confirming the suspicions? (Select TWO.)

A.    Networking access control
B.    DLP alerts
C.    Log analysis
D.    File integrity monitoring
E.    Host firewall rules

Answer: BC

A company is deploying a new VoIP phone system. They require 99.999% uptime for their phone service and are concerned about their existing data network interfering with the VoIP phone system. The core switches in the existing data network are almost fully saturated. Which of the following options will provide the best performance and availability for both the VoIP traffic, as well as the traffic on the existing data network?

A.    Put the VoIP network into a different VLAN than the existing data network.
B.    Upgrade the edge switches from 10/100/1000 to improve network speed.
C.    Physically separate the VoIP phones from the data network.
D.    Implement flood guards on the data network.

Answer: A

A server administrator needs to administer a server remotely using RDP, but the specified port is closed on the outbound firewall on the network. The access the server using RDP on a port other than the typical registered port for the RDP protocol?

A.    TLS
B.    MPLS
C.    SCP
D.    SSH

Answer: A

Which of the following can be used to control specific commands that can be executed on a network infrastructure device?

A.    LDAP
B.    Kerberos
C.    SAML

Answer: D

Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate-based authentication with its users. The company uses SSL-inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication. Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?

A.    Use of OATH between the user and the service and attestation from the company domain
B.    Use of active directory federation between the company and the cloud-based service
C.    Use of smartcards that store x.509 keys, signed by a global CA
D.    Use of a third-party, SAML-based authentication service for attestation

Answer: B

Six months into development, the core team assigned to implement a new internal piece of software must convene to discuss a new requirement with the stake holders. A stakeholder identified a missing feature critical to the organization, which must be implemented. The team needs to validate the feasibility of the newly introduced requirement and ensure it does not introduce new vulnerabilities to the software and other applications that will integrate with it. Which of the following BEST describes what the company?

A.    The system integration phase of the SDLC
B.    The system analysis phase of SDLC
C.    The system design phase of the SDLC
D.    The system development phase of the SDLC

Answer: B

A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation, the supervisor terminates an employee as a result of the suspected data loss. During the investigation, the supervisor is absent for the interview, and little evidence can be provided form the role-based authentication system in use by the company. The situation can be identified for future mitigation as which of the following?

A.    Job rotation
B.    Log failure
C.    Lack of training
D.    Insider threat

Answer: B

Welcome to choose PassLeader SY0-401 dumps for 100% passing CompTIA SY0-401 exam: https://www.passleader.com/sy0-401.html (1868 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader SY0-401 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpcG9CWHp3bXlNTTg