aiotestking uk

SY0-401 Exam Questions - Online Test


SY0-401 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which of the following risk concepts requires an organization to determine the number of failures per year? 

A. SLE 

B. ALE 

C. MTBF 

D. Quantitative analysis 

Answer:

Explanation: 

ALE is the annual loss expectancy value. This is a monetary measure of how much loss you could expect in a year. 

Q2. Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective? 

A. CHAP 

B. SAML 

C. Kerberos 

D. Diameter 

Answer:

Explanation: 

Diameter is an authentication, authorization, and accounting protocol that replaces the RADIUS protocol. Diameter Applications extend the base protocol by including new commands and/or attributes, such as those for use of the Extensible Authentication Protocol (EAP). 

Q3. Ann has recently transferred from the payroll department to engineering. While browsing file shares, Ann notices she can access the payroll status and pay rates of her new coworkers. Which of the following could prevent this scenario from occurring? 

A. Credential management 

B. Continuous monitoring 

C. Separation of duties 

D. User access reviews 

Answer:

Explanation: 

Q4. Each server on a subnet is configured to only allow SSH access from the administrator’s workstation. Which of the following BEST describes this implementation? 

A. Host-based firewalls 

B. Network firewalls 

C. Network proxy 

D. Host intrusion prevention 

Answer:

Explanation: 

A host-based firewall is installed on a client system and is used to protect the client system from the activities of the user as well as from communication from the network or Internet. These firewalls manage network traffic using filters to block certain ports and protocols while allowing others to pass through the system. 

Q5. Establishing a published chart of roles, responsibilities, and chain of command to be used during a disaster is an example of which of the following? 

A. Fault tolerance 

B. Succession planning 

C. Business continuity testing 

D. Recovery point objectives 

Answer:

Explanation: 

Succession planning outlines those internal to the organization that has the ability to step into positions when they open. By identifying key roles that cannot be left unfilled and associating internal employees who can step into these roles, you can groom those employees to make sure that they are up to speed when it comes time for them to fill those positions. 

Q6. Speaking a passphrase into a voice print analyzer is an example of which of the following security concepts? 

A. Two factor authentication 

B. Identification and authorization 

C. Single sign-on 

D. Single factor authentication 

Answer:

Explanation: 

Two-factor authentication is when two different authentication factors are provided for 

authentication purposes. 

Speaking (Voice) – something they are. 

Passphrase – something they know. 

Q7. How must user accounts for exiting employees be handled? 

A. Disabled, regardless of the circumstances 

B. Disabled if the employee has been terminated 

C. Deleted, regardless of the circumstances 

D. Deleted if the employee has been terminated 

Answer:

Explanation: 

You should always disable an employee’s account as soon as they leave. The employee knows the username and password of the account and could continue to log in for potentially malicious purposes. Disabling the account will ensure that no one can log in using that account. 

Q8. Pete, the system administrator, has concerns regarding users losing their company provided smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his concerns? 

A. Enforce device passwords. 

B. Use remote sanitation. 

C. Enable GPS tracking. 

D. Encrypt stored data. 

Answer:

Explanation: 

Global Positioning System (GPS) tracking can be used to identify its location of a stolen device and can allow authorities to recover the device. However, for GPS tracking to work, the device must have an Internet connection or a wireless phone service over which to send its location information. 

Q9. Which of the following solutions provides the most flexibility when testing new security controls prior to implementation? 

A. Trusted OS 

B. Host software baselining 

C. OS hardening 

D. Virtualization 

Answer:

Explanation: 

Q10. A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control? 

A. Implicit deny 

B. Role-based Access Control 

C. Mandatory Access Controls 

D. Least privilege 

Answer:

Explanation: 

Mandatory Access Control allows access to be granted or restricted based on the rules of classification. MAC also includes the use of need to know. Need to know is a security restriction where some objects are restricted unless the subject has a need to know them.