Free Download Lead2pass VCE And PDF Dumps
https://www.pass4sureshared.com/2017-new-free-lead2pass-comptia-sy0-401-dumps-vce-download-51-75.html
Export date: Thu Mar 28 9:41:52 2024 / +0000 GMT

[2017 New] Free Lead2pass CompTIA SY0-401 Dumps VCE Download (51-75)


2017 July CompTIA Official New Released SY0-401 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Lead2pass is now offering Lead2pass SY0-401 dumps PDF and Test Engine with 100% passing guarantee. Buy Lead2pass SY0-401 PDF and pass your exam easily. If you want real exam simulation then buy test engine and install on your pc for preparation.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html 3 1

QUESTION 51
An administrator connects VoIP phones to the same switch as the network PCs and printers. Which of the following would provide the BEST logical separation of these three device types while still allowing traffic between them via ACL?

A.    Create three VLANs on the switch connected to a router
B.    Define three subnets, configure each device to use their own dedicated IP address range, and then connect the network to a router
C.    Install a firewall and connect it to the switch
D.    Install a firewall and connect it to a dedicated switch for each device type

Answer: A
Explanation:
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function.


QUESTION 52
An administrator needs to segment internal traffic between layer 2 devices within the LAN. Which of the following types of network design elements would MOST likely be used?

A.    Routing
B.    DMZ
C.    VLAN
D.    NAT

Answer: C
Explanation:
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function.


QUESTION 53
Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department's server, and the accounting department should not have access to the HR department's server. The network is separated by switches.
Which of the following is designed to keep the HR department users from accessing the accounting department's server and vice-versa?

A.    ACLs
B.    VLANs
C.    DMZs
D.    NATS

Answer: B
Explanation:
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function.


QUESTION 54
According to company policy an administrator must logically keep the Human Resources department separated from the Accounting department. Which of the following would be the simplest way to accomplish this?

A.    NIDS
B.    DMZ
C.    NAT
D.    VLAN

Answer: D
Explanation:
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches.


QUESTION 55
Review the following diagram depicting communication between PC1 and PC2 on each side of a router. Analyze the network traffic logs which show communication between the two computers as captured by the computer with IP 10.2.2.10.

DIAGRAM
PC1 PC2
[192.168.1.30]--------[INSIDE 192.168.1.1 router OUTSIDE 10.2.2.1]---------[10.2.2.10] LOGS
10:30:22, SRC 10.2.2.1:3030, DST 10.2.2.10:80, SYN
10:30:23, SRC 10.2.2.10:80, DST 10.2.2.1:3030, SYN/ACK
10:30:24, SRC 10.2.2.1:3030, DST 10.2.2.10:80, ACK

Given the above information, which of the following can be inferred about the above environment?

A.    192.168.1.30 is a web server.
B.    The web server listens on a non-standard port.
C.    The router filters port 80 traffic.
D.    The router implements NAT.

Answer: D
Explanation:
Network address translation (NAT) allows you to share a connection to the public Internet via a single interface with a single public IP address. NAT maps the private addresses to the public address. In a typical configuration, a local network uses one of the designated "private" IP address subnets. A router on that network has a private address (192.168.1.1) in that address space, and is also connected to the Internet with a "public" address (10.2.2.1) assigned by an Internet service provider.


QUESTION 56
An administrator wishes to hide the network addresses of an internal network when connecting to the Internet. The MOST effective way to mask the network address of the users would be by passing the traffic through a:

A.    stateful firewall
B.    packet-filtering firewall
C.    NIPS
D.    NAT

Answer: D
Explanation:
NAT serves as a basic firewall by only allowing incoming traffic that is in response to an internal system's request.


QUESTION 57
A company's business model was changed to provide more web presence and now its ERM software is no longer able to support the security needs of the company. The current data center will continue to provide network and security services. Which of the following network elements would be used to support the new business model?

A.    Software as a Service
B.    DMZ
C.    Remote access support
D.    Infrastructure as a Service

Answer: A
Explanation:
Software as a Service (SaaS) allows for on-demand online access to specific software applications or suites without having to install it locally. This will allow the data center to continue providing network and security services.


QUESTION 58
The Chief Information Officer (CIO) has mandated web based Customer Relationship Management (CRM) business functions be moved offshore to reduce cost, reduce IT overheads, and improve availability. The Chief Risk Officer (CRO) has agreed with the CIO's direction but has mandated that key authentication systems be run within the organization's network.
Which of the following would BEST meet the CIO and CRO's requirements?

A.    Software as a Service
B.    Infrastructure as a Service
C.    Platform as a Service
D.    Hosted virtualization service

Answer: A
Explanation:
Software as a Service (SaaS) is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet.


QUESTION 59
An IT director is looking to reduce the footprint of their company's server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. Which of the following BEST describes this arrangement?

A.    Infrastructure as a Service
B.    Storage as a Service
C.    Platform as a Service
D.    Software as a Service

Answer: A
Explanation:
Cloud users install operating-system images and their application software on the cloud infrastructure to deploy their applications. In this model, the cloud user patches and maintains the operating systems and the application software.


QUESTION 60
Which of the following offerings typically allows the customer to apply operating system patches?

A.    Software as a service
B.    Public Clouds
C.    Cloud Based Storage
D.    Infrastructure as a service

Answer: D
Explanation:
Cloud users install operating-system images and their application software on the cloud infrastructure to deploy their applications. In this model, the cloud user patches and maintains the operating systems and the application software.


QUESTION 61
Which of the following technologies can store multi-tenant data with different security requirements?

A.    Data loss prevention
B.    Trusted platform module
C.    Hard drive encryption
D.    Cloud computing

Answer: D
Explanation:
One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This "multitenant" nature means that workloads from different clients can be on the same system, and a flaw in implementation could compromise security.


QUESTION 62
Multi-tenancy is a concept found in which of the following?

A.    Full disk encryption
B.    Removable media
C.    Cloud computing
D.    Data loss prevention

Answer: C
Explanation:
One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This "multitenant" nature means that workloads from different clients can be on the same system, and a flaw in implementation could compromise security.


QUESTION 63
Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?

A.    Protocol filter
B.    Load balancer
C.    NIDS
D.    Layer 7 firewall

Answer: D
Explanation:
An application-level gateway firewall filters traffic based on user access, group membership, the application or service used, or even the type of resources being transmitted.
This type of firewall operates at the Application layer (Layer 7) of the OSI model.


QUESTION 64
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:

A.    Redundant systems.
B.    Separation of duties.
C.    Layered security.
D.    Application control.

Answer: C
Explanation:
Layered security is the practice of combining multiple mitigating security controls to protect resources and data.


QUESTION 65
A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?

A.    IPsec
B.    SFTP
C.    BGP
D.    PPTP

Answer: A
Explanation:
Layer 2 Tunneling Protocol (L2TP) came about through a partnership between Cisco and Microsoft with the intention of providing a more secure VPN protocol. L2TP is considered to be a more secure option than PPTP, as the IPSec protocol which holds more secure encryption algorithms, is utilized in conjunction with it. It also requires a pre-shared certificate or key. L2TP's strongest level of encryption makes use of 168 bit keys, 3 DES encryption algorithm and requires two levels of authentication.
L2TP has a number of advantages in comparison to PPTP in terms of providing data integrity and authentication of origin verification designed to keep hackers from compromising the system. However, the increased overhead required to manage this elevated security means that it performs at a slower pace than PPTP.


QUESTION 66
Pete, a network administrator, is implementing IPv6 in the DMZ. Which of the following protocols must he allow through the firewall to ensure the web servers can be reached via IPv6 from an IPv6 enabled Internet host?

A.    TCP port 443 and IP protocol 46
B.    TCP port 80 and TCP port 443
C.    TCP port 80 and ICMP
D.    TCP port 443 and SNMP

Answer: B
Explanation:
HTTP and HTTPS, which uses TCP port 80 and TCP port 443 respectively, is necessary for Communicating with Web servers. It should therefore be allowed through the firewall.


QUESTION 67
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow incoming SFTP connections?

A.    21/UDP
B.    21/TCP
C.    22/UDP
D.    22/TCP

Answer: D
Explanation:
SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22.


QUESTION 68
A network administrator is asked to send a large file containing PII to a business associate.
Which of the following protocols is the BEST choice to use?

A.    SSH
B.    SFTP
C.    SMTP
D.    FTP

Answer: B
Explanation:
SFTP encrypts authentication and data traffic between the client and server by making use of SSH to provide secure FTP communications. As a result, SFTP offers protection for both the authentication traffic and the data transfer taking place between a client and server.


QUESTION 69
Which of the following is a difference between TFTP and FTP?

A.    TFTP is slower than FTP.
B.    TFTP is more secure than FTP.
C.    TFTP utilizes TCP and FTP uses UDP.
D.    TFTP utilizes UDP and FTP uses TCP.

Answer: D
Explanation:
FTP employs TCP ports 20 and 21 to establish and maintain client-to-server communications, whereas TFTP makes use of UDP port 69.


QUESTION 70
Which of the following is the default port for TFTP?

A.    20
B.    69
C.    21
D.    68

Answer: B
Explanation:
TFTP makes use of UDP port 69.


QUESTION 71
A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal?

A.    Block port 23 on the L2 switch at each remote site
B.    Block port 23 on the network firewall
C.    Block port 25 on the L2 switch at each remote site
D.    Block port 25 on the network firewall

Answer: B
Explanation:
Telnet is a terminal-emulation network application that supports remote connectivity for executing commands and running applications but doesn't support transfer of fi les. Telnet uses TCP port 23. Because it's a clear text protocol and service, it should be avoided and replaced with SSH.


QUESTION 72
A security analyst noticed a colleague typing the following command:

`Telnet some-host 443'

Which of the following was the colleague performing?

A.    A hacking attempt to the some-host web server with the purpose of achieving a distributed denial of service attack.
B.    A quick test to see if there is a service running on some-host TCP/443, which is being routed correctly and not blocked by a firewall.
C.    Trying to establish an insecure remote management session. The colleague should be using SSH or terminal services instead.
D.    A mistaken port being entered because telnet servers typically do not listen on port 443.

Answer: B
Explanation:
B: The Telnet program parameters are: telnet <hostname> <port> <hostname> is the name or IP address of the remote server to connect to. <port> is the port number of the service to use for the connection. TCP port 443 provides the HTTPS (used for secure web connections) service; it is the default SSL port. By running the Telnet some-host 443 command, the security analyst is checking that routing is done properly and not blocked by a firewall.


QUESTION 73
Which of the following secure file transfer methods uses port 22 by default?

A.    FTPS
B.    SFTP
C.    SSL
D.    S/MIME

Answer: B
Explanation:
SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22.


QUESTION 74
Which of the following BEST describes the weakness in WEP encryption?

A.    The initialization vector of WEP uses a crack-able RC4 encryption algorithm.
Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived.
B.    The WEP key is stored in plain text and split in portions across 224 packets of random data.
Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key.
C.    The WEP key has a weak MD4 hashing algorithm used.
A simple rainbow table can be used to generate key possibilities due to MD4 collisions.
D.    The WEP key is stored with a very small pool of random numbers to make the cipher text.
As the random numbers are often reused it becomes easy to derive the remaining WEP key.

Answer: D
Explanation:
WEP is based on RC4, but due to errors in design and implementation, WEP is weak in a number of areas, two of which are the use of a static common key and poor implementation of initiation vectors (IVs). When the WEP key is discovered, the attacker can join the network and then listen in on all other wireless client communications.


QUESTION 75
Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords?

A.    EAP-MD5
B.    WEP
C.    PEAP-MSCHAPv2
D.    EAP-TLS

Answer: C
Explanation:
PEAP-MS-CHAP v2 is easier to deploy than EAP-TLS or PEAP-TLS because user authentication is accomplished via password-base credentials (user name and password) rather than digital certificates or smart cards.

Now we are one step ahead in providing updated real exam dumps for SY0-401. We provide 100% SY0-401 exam passing guarantee as we will provide you same questions of SY0-401 exam with their answers. Our CompTIA SY0-401 new questions are verified by experts.

SY0-401 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDVzFZWExUbFM0YU0 2

2017 CompTIA SY0-401 exam dumps (All 1868 Q&As) from Lead2pass:

https://www.lead2pass.com/sy0-401.html 3 1 [100% Exam Pass Guaranteed]

Links:
  1. https://www.lead2pass.com/sy0-401.html
  2. https://drive.google.com/open?id=0B3Syig5i8gpDVzFZ WExUbFM0YU0
  3. https://www.lead2pass.com/sy0-401.html
Post date: 2017-07-24 03:37:26
Post date GMT: 2017-07-24 03:37:26

Post modified date: 2017-07-24 03:37:26
Post modified date GMT: 2017-07-24 03:37:26

Export date: Thu Mar 28 9:41:52 2024 / +0000 GMT
This page was exported from Free Download Lead2pass VCE And PDF Dumps [ https://www.pass4sureshared.com ]
Export of Post and Page has been powered by [ Universal Post Manager ] plugin from www.ProfProjects.com