aiotestking uk

SY0-401 Exam Questions - Online Test


SY0-401 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. An administrator needs to connect a router in one building to a router in another using Ethernet. Each router is connected to a managed switch and the switches are connected to each other via a fiber line. Which of the following should be configured to prevent unauthorized devices from connecting to the network? 

A. Configure each port on the switches to use the same VLAN other than the default one 

B. Enable VTP on both switches and set to the same domain 

C. Configure only one of the routers to run DHCP services 

D. Implement port security on the switches 

Answer:

Explanation: 

Port security in IT can mean several things: The physical control of all connection points, such as RJ-45 wall jacks or device ports, so that no unauthorized users or unauthorized devices can attempt to connect into an open port. The management of TCP and User Datagram Protocol (UDP) ports. If a service is active and assigned to a port, then that port is open. All the other 65,535 ports (of TCP or UDP) are closed if a service isn’t actively using them. Port knocking is a security system in which all ports on a system appear closed. However, if the client sends packets to a specific set of ports in a certain order, a bit like a secret knock, then the desired service port becomes open and allows the client software to connect to the service. 

Q2. ABC company has a lot of contractors working for them. The provisioning team does not always get notified that a contractor has left the company. Which of the following policies would prevent contractors from having access to systems in the event a contractor has left? 

A. Annual account review 

B. Account expiration policy 

C. Account lockout policy 

D. Account disablement 

Answer:

Explanation: 

Account expiration is a secure feature to employ on user accounts for temporary workers, interns, or consultants. It automatically disables a user account or causes the account to expire at a specific time and on a specific day. 

Q3. The security officer is preparing a read-only USB stick with a document of important personal phone numbers, vendor contacts, an MD5 program, and other tools to provide to employees. At which of the following points in an incident should the officer instruct employees to use this information? 

A. Business Impact Analysis 

B. First Responder 

C. Damage and Loss Control 

D. Contingency Planning 

Answer:

Explanation: 

Incident response procedures involves: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. In this scenario the security officer is carrying out an incident response measure that will address and be of benefit to those in the vanguard, i.e. the employees and they are the first responders. 

Q4. Which of the following offers the LEAST secure encryption capabilities? 

A. TwoFish 

B. PAP 

C. NTLM 

D. CHAP 

Answer:

Explanation: 

PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like CHAP or EAP. 

Q5. A security administrator plans on replacing a critical business application in five years. Recently, there was a security flaw discovered in the application that will cause the IT department to manually re-enable user accounts each month at a cost of $2,000. Patching the application today would cost $140,000 and take two months to implement. Which of the following should the security administrator do in regards to the application? 

A. Avoid the risk to the user base allowing them to re-enable their own accounts 

B. Mitigate the risk by patching the application to increase security and saving money 

C. Transfer the risk replacing the application now instead of in five years 

D. Accept the risk and continue to enable the accounts each month saving money 

Answer:

Explanation: 

This is a risk acceptance measure that has to be implemented since the cost of patching would be too high compared to the cost to keep the system going as is. Risk acceptance is often the choice you must make when the cost of implementing any of the other four choices (i.e. risk deterrence, mitigation, transference or avoidance) exceeds the value of the harm that would occur if the risk came to fruition. 

Q6. Users need to exchange a shared secret to begin communicating securely. Which of the following is another name for this symmetric key? 

A. Session Key 

B. Public Key 

C. Private Key 

D. Digital Signature 

Answer:

Explanation: 

Explanation: Symmetric algorithms require both ends of an encrypted message to have the same key and processing algorithms. Symmetric algorithms generate a secret key that must be protected. A symmetric key, sometimes referred to as a secret key or private key, is a key that isn’t disclosed to people who aren’t authorized to use the encryption system. 

Q7. The incident response team has received the following email message. 

From: monitor@ext-company.com To: security@company.com Subject: Copyright infringement 

A copyright infringement alert was triggered by IP address 13.10.66.5 at 09: 50: 01 GMT. 

After reviewing the following web logs for IP 13.10.66.5, the team is unable to correlate and identify the incident. 

09:

 45: 33 13.10.66.5 http: //remote.site.com/login.asp?user=john 

09:

 50: 22 13.10.66.5 http: //remote.site.com/logout.asp?user=anne 

10: 50: 01 13.10.66.5 http: //remote.site.com/access.asp?file=movie.mov 

11: 02: 45 13.10.65.5 http: //remote.site.com/download.asp?movie.mov=ok 

Which of the following is the MOST likely reason why the incident response team is unable to identify and correlate the incident? 

A. The logs are corrupt and no longer forensically sound. 

B. Traffic logs for the incident are unavailable. 

C. Chain of custody was not properly maintained. 

D. Incident time offsets were not accounted for. 

Answer:

Explanation: 

It is quite common for workstation times to be off slightly from actual time, and that can happen with servers as well. Since a forensic investigation is usually dependent on a step-by-step account of what has happened, being able to follow events in the correct time sequence is critical. Because of this, it is imperative to record the time offset on each affected machine during the investigation. One method of assisting with this is to add an entry to a log file and note the time that this was done and the time associated with it on the system. 

Q8. A company that has a mandatory vacation policy has implemented which of the following controls? 

A. Risk control 

B. Privacy control 

C. Technical control 

D. Physical control 

Answer:

Explanation: 

Risk mitigation is done anytime you take steps to reduce risks. Thus mandatory vacation implementation is done as a risk control measure because it is a step that is taken as risk mitigation. 

Q9. Used in conjunction, which of the following are PII? (Select TWO). 

A. Marital status 

B. Favorite movie 

C. Pet’s name 

D. Birthday 

E. Full name 

Answer: D,E 

Explanation: 

Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card number, or patient record. A birthday together with a full name makes it personally identifiable information. 

Q10. A company is looking to improve their security posture by addressing risks uncovered by a recent penetration test. Which of the following risks is MOST likely to affect the business on a day-to-day basis? 

A. Insufficient encryption methods 

B. Large scale natural disasters 

C. Corporate espionage 

D. Lack of antivirus software 

Answer:

Explanation: 

The most common threat to computers is computer viruses. A computer can become infected with a virus through day-to-day activities such as browsing web sites or emails. As browsing and opening emails are the most common activities performed by all users, computer viruses represent the most likely risk to a business.