CompTIA SY0-401 Exam - CheatCerts.com
Free SY0-401 Sample Questions:
A software developer is responsible for writing the code on an accounting application. Another software developer is responsible for developing code on a system in human resources. Once a year they have to switch roles for several weeks.
Which of the following practices is being implemented?
A. Mandatory vacations
B. Job rotation
C. Least privilege
D. Separation of duties
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow incoming SFTP connections?
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire?
A. Install a proxy server between the users' computers and the switch to filter inbound network traffic
B. Block commonly used ports and forward them to higher and unused port numbers
C. Configure the switch to allow only traffic from computers based upon their physical address
D. Install host-based intrusion detection software to monitor incoming DHCP Discover requests
In which of the following steps of incident response does a team analyze the incident and determine steps to prevent a future occurrence?
D. Lessons learned
Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is worried about the confidentiality of the information. Which of the following will accomplish this task securely?
A. Digital Signatures
C. Secret Key
Which of the following risk concepts requires an organization to determine the number of failures per year?
D. Quantitative analysis
A security engineer, Joe, has been asked to create a secure connection between his mail server and the mail server of a business partner. Which of the following protocol would be MOST appropriate?
A malicious person gained access to a datacenter by ripping the proximity badge reader off the wall near the datacenter entrance. This caused the electronic locks on the datacenter door to release because the?
A. badge reader was improperly installed
B. system was designed to fail open for life-safety
C. system was installed in a fail closed configuration
D. system used magnetic locks and the locks became demagnetized
Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?
The security team would like to gather intelligence about the types of attacks being launched against the organization. Which of the following would provide them with the MOST secure information?
A. Implement a honeynet
B. Perform a penetration test
C. Examine firewall logs
D. Deploy an IDS