CompTIA Exam Security+ SY0-401 Dumps With VCE and PDF Download (Question 1701 – Question 1710)

PassLeader released the NEWEST CompTIA SY0-401 exam dumps recently! Both SY0-401 VCE dumps and SY0-401 PDF dumps are available on PassLeader, either SY0-401 VCE dumps or SY0-401 PDF dumps have the NEWEST SY0-401 exam questions in it, they will help you passing CompTIA SY0-401 exam easily! You can download the valid SY0-401 dumps VCE and PDF from PassLeader here: https://www.passleader.com/sy0-401.html (1868 Q&As Dumps)

Also, previewing the NEWEST PassLeader SY0-401 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpcG9CWHp3bXlNTTg

QUESTION 1701
Having adequate lighting on the outside of a building is an example of which of the following security controls?

A.    Deterrent
B.    Compensating
C.    Detective
D.    Preventative

Answer: A

QUESTION 1702
During a recent audit, it was discovered that several user accounts belonging to former employees were still active and had valid VPN permissions. Which of the following would help reduce the amount of risk the organization incurs in this situation in the future?

A.    Time-of-day restrictions
B.    User access reviews
C.    Group-based privileges
D.    Change management policies

Answer: B

QUESTION 1703
An organization is working with a cloud services provider to transition critical business applications to a hybrid cloud environment. The organization retains sensitive customer data and wants to ensure the provider has sufficient administrative and logical controls in place to protect its data. In which of the following documents would this concern MOST likely be addressed?

A.    Service level agreement
B.    Interconnection security agreement
C.    Non-disclosure agreement
D.    Business process analysis

Answer: A

QUESTION 1704
A security administrator wants to implement a company-wide policy to empower data owners to manage and enforce access control rules on various resources. Which of the following should be implemented?

A.    Mandatory access control
B.    Discretionary access control
C.    Role-based access control
D.    Rule-based access control

Answer: C

QUESTION 1705
Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being aware of the interception and potential modification to the communications?

A.    Spear phishing
B.    Man-in-the-middle
C.    URL hijacking
D.    Transitive access

Answer: B

QUESTION 1706
A security administrator wishes to implement a secure a method of file transfer when communicating with outside organizations. Which of the following protocols would BEST facilitate secure file transfers? (Select TWO.)

A.    SCP
B.    TFTP
C.    SNMP
D.    FTP
E.    SMTP
F.    FTPS

Answer: A

QUESTION 1707
A technician needs to implement a system which will properly authenticate users by their username and password only when the users are logging in from a computer in the office building. Any attempt to authenticate from a location other than the office building should be rejected. Which of the following MUST the technician implement?

A.    Dual factor authentication
B.    Transitive authentication
C.    Single factor authentication
D.    Biometric authentication

Answer: B

QUESTION 1708
After correctly configuring a new wireless enabled thermostat to control the temperature of the company’s meeting room, Joe, a network administrator determines that the thermostat is not connecting to the internet-based control system. Joe verifies that the thermostat received the expected network parameters and it is associated with the AP. Additionally, the other wireless mobile devices connected to the same wireless network are functioning properly. The network administrator verified that the thermostat works when tested at his residence. Which of the following is the MOST likely reason the thermostat is not connecting to the internet?

A.    The company implements a captive portal
B.    The thermostat is using the incorrect encryption algorithm
C.    the WPA2 shared likely is incorrect
D.    The company’s DHCP server scope is full

Answer: C

QUESTION 1709
A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a potential partner (www.example.net). Which of the following rules is preventing the CSO from accessing the site?

A.    Rule 1: deny from inside to outside source any destination any service smtp.
B.    Rule 2: deny from inside to outside source any destination any service ping.
C.    Rule 3: deny from inside to outside source any destination {blocked sites} service http-https.
D.    Rule 4: deny from any to any source any destination any service any.

Answer: C

QUESTION 1710
Malware that changes its binary pattern on specific dates at specific times to avoid detection is known as a (n) ____.

A.    armored virus
B.    logic bomb
C.    polymorphic virus
D.    trojan

Answer: C


Welcome to choose PassLeader SY0-401 dumps for 100% passing CompTIA SY0-401 exam: https://www.passleader.com/sy0-401.html (1868 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader SY0-401 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpcG9CWHp3bXlNTTg