[April 2018] Ensure Pass SY0-401 Exam With Lead2pass New SY0-401 Brain Dumps 1868q

Quickly Pass SY0-401 Test With Lead2pass New SY0-401 Brain Dumps:

https://www.lead2pass.com/sy0-401.html

QUESTION 21
The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote site. Which of the following would need to be implemented?

A.    Implicit deny
B.    VLAN management
C.    Port security
D.    Access control lists Continue reading

[March 2018] Lead2pass Latest CompTIA SY0-401 Exam Questions Free Downloading 1868q

Lead2pass SY0-401 Dumps PDF Free Download:

https://www.lead2pass.com/sy0-401.html

QUESTION 11
An administrator would like to review the effectiveness of existing security in the enterprise. Which of the following would be the BEST place to start?

A.    Review past security incidents and their resolution
B.    Rewrite the existing security policy
C.    Implement an intrusion prevention system
D.    Install honey pot systems

Answer: C
Explanation:
The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it

QUESTION 12
A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration.
Which of the following should be implemented to secure the devices without risking availability?

A.    Host-based firewall
B.    IDS
C.    IPS
D.    Honeypot

Answer: B
Explanation:
An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization.
IDPSes typically record information related to observed events, notify security administrators of important observed events and produce reports. Many IDPSes can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g. reconfiguring a firewall) or changing the attack’s content.

QUESTION 13
Lab Sim – Configure the Firewall
Task: Configure the firewall (fill out the table) to allow these four rules:

– Only allow the Accounting computer to have HTTPS access to the Administrative server.
– Only allow the HR computer to be able to communicate with the Server 2 System over SCP.
– Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2

131
132

Answer:
Use the following answer for this simulation task.
Below table has all the answers required for this question.

133

Explanation:
Firewall rules act like ACLs, and they are used to dictate what traffic can pass between the firewall and the internal network. Three possible actions can be taken based on the rule’s criteria:

Block the connection
Allow the connection
Allow the connection only if it is secured

TCP is responsible for providing a reliable, one-to-one, connection-oriented session.
TCP establishes a connection and ensures that the other end receives any packets sent.
Two hosts communicate packet results with each other. TCP also ensures that packets are decoded and sequenced properly. This connection is persistent during the session.
When the session ends, the connection is torn down.
UDP provides an unreliable connectionless communication method between hosts.
UDP is considered a best-effort protocol, but it’s considerably faster than TCP.
The sessions don’t establish a synchronized session like the kind used in TCP, and UDP doesn’t guarantee error-free communications.
The primary purpose of UDP is to send small packets of information.
The application is responsible for acknowledging the correct reception of the data.
Port 22 is used by both SSH and SCP with UDP.
Port 443 is used for secure web connections ?HTTPS and is a TCP port.
Thus to make sure only the Accounting computer has HTTPS access to the Administrative server you should use TCP port 443 and set the rule to allow communication between 10.4.255.10/24 (Accounting) and 10.4.255.101 (Administrative server1) Thus to make sure that only the HR computer has access to Server2 over SCP you need use of TCP port 22 and set the rule to allow communication between 10.4.255.10/23 (HR) and 10.4.255.2 (server2)
Thus to make sure that the IT computer can access both the Administrative servers you need to use a port and accompanying port number and set the rule to allow communication between:
10.4.255.10.25 (IT computer) and 10.4.255.101 (Administrative server1)
10.4.255.10.25 (IT computer) and 10.4.255.102 (Administrative server2)

QUESTION 14
Hotspot Question
The security administrator has installed a new firewall which implements an implicit DENY policy by default Click on the firewall and configure it to allow ONLY the following communication.

1. The Accounting workstation can ONLY access the web server on the public network over the default HTTPS port. The accounting workstation should not access other networks.
2. The HR workstation should be restricted to communicate with the Financial server ONLY, over the default SCP port
3. The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port.

Instructions: The firewall will process the rules in a top-down manner in order as a first match The port number must be typed in and only one port number can be entered per rule Type ANY for all ports. The original firewall configuration can be reset at any time by pressing the reset button. Once you have met the simulation requirements, click save and then Done to submit.

141

142

Answer:

143

Explanation:
Implicit deny is the default security stance that says if you aren’t specifically granted access or privileges for a resource, you’re denied access by default.
Rule #1 allows the Accounting workstation to ONLY access the web server on the public network over the default HTTPS port, which is TCP port 443.
Rule #2 allows the HR workstation to ONLY communicate with the Financial server over the default SCP port, which is TCP Port 22
Rule #3 & Rule #4 allow the Admin workstation to ONLY access the Financial and Purchasing servers located on the secure network over the default TFTP port, which is Port 69.

QUESTION 15
Which of the following firewall rules only denies DNS zone transfers?

A.    deny udp any any port 53
B.    deny ip any any
C.    deny tcp any any port 53
D.    deny all dns packets

Answer: C
Explanation:
DNS operates over TCP and UDP port 53. TCP port 53 is used for zone transfers.

QUESTION 16
A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic.
Which of the following would accomplish this task?

A.    Deny TCP port 68
B.    Deny TCP port 69
C.    Deny UDP port 68
D.    Deny UDP port 69

Answer: D
Explanation:
Trivial File Transfer Protocol (TFTP) is a simple file-exchange protocol that doesn’t require authentication. It operates on UDP port 69.

QUESTION 17
Sara, a security technician, has received notice that a vendor coming in for a presentation will require access to a server outside of the network. Currently, users are only able to access remote sites through a VPN connection. How could Sara BEST accommodate the vendor?

A.    Allow incoming IPSec traffic into the vendor’s IP address.
B.    Set up a VPN account for the vendor, allowing access to the remote site.
C.    Turn off the firewall while the vendor is in the office, allowing access to the remote site.
D.    Write a firewall rule to allow the vendor to have access to the remote site.

Answer: D
Explanation:
Firewall rules are used to define what traffic is able pass between the firewall and the internal network. Firewall rules block the connection, allow the connection, or allow the connection only if it is secured. Firewall rules can be applied to inbound traffic or outbound traffic and any type of network.

QUESTION 18
A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?

A.    Implement a virtual firewall
B.    Install HIPS on each VM
C.    Virtual switches with VLANs
D.    Develop a patch management guide

Answer: C
Explanation:
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. VLANs can be used to isolate traffic between network segments.

QUESTION 19
A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks.
Which of the following is MOST likely the reason for the sub-interfaces?

A.    The network uses the subnet of 255.255.255.128.
B.    The switch has several VLANs configured on it.
C.    The sub-interfaces are configured for VoIP traffic.
D.    The sub-interfaces each implement quality of service.

Answer: B
Explanation:
A subinterface is a division of one physical interface into multiple logical interfaces. Routers commonly employ subinterfaces for a variety of purposes, most common of these are for routing traffic between VLANs. Also, IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network.

QUESTION 20
Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles during the week. Further investigation by the system engineering team determined that a timed .exe file had been uploaded to the system control console during a visit by international contractors. Which of the following actions should Joe recommend?

A.    Create a VLAN for the SCADA
B.    Enable PKI for the MainFrame
C.    Implement patch management
D.    Implement stronger WPA2 Wireless

Answer: A
Explanation:
VLANs are used for traffic management. VLANs can be used to isolate traffic between network segments. This can be accomplished by not defining a route between different VLANs or by specifying a deny filter between certain VLANs (or certain members of a VLAN). Any network segment that doesn’t need to communicate with another in order to accomplish a work task/function shouldn’t be able to do so.

SY0-401 dumps full version (PDF&VCE): https://www.lead2pass.com/sy0-401.html

Large amount of free SY0-401 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDLXZsWm9MWmh0a0E

You may also need:

SY0-501 exam dumps: https://drive.google.com/open?id=1Hm6GQHDVOsEnyhNf3EHqIGEtor5IUsfu

[January 2018] Latest Lead2pass SY0-401 Exam Free SY0-401 Dumps Download 1868q

Latest Released CompTIA SY0-401 Exam Question Free Download From Lead2pass:

https://www.lead2pass.com/sy0-401.html

QUESTION 1
Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network?

A.    HIPS on each virtual machine
B.    NIPS on the network
C.    NIDS on the network
D.    HIDS on each virtual machine

Continue reading

[Lead2pass New] SY0-401 Exam Dump Free Updation Availabe In Lead2pass (751-775)

Took the SY0-401 exams yesterday and scored 9xx. Lead2pass SY0-401 exam dumps are valid. Almost all of the multiple choice came out.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 751
Which of the following protocols provides transport security for virtual terminal emulation?

A.    TLS
B.    SSH
C.    SCP
D.    S/MIME

Continue reading

[Lead2pass New] SY0-401 Exam Dump Free Updation Availabe In Lead2pass (726-750)

I passed the SY0-401 exam today with 9xx. Lead2pass SY0-401 exam question is valid. Thank you all and special thanks to Lead2pass.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 726
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?

A.    RIPEMD
B.    MD5
C.    SHA
D.    HMAC

Continue reading

[Lead2pass New] CompTIA Exam SY0-401 PDF Dump Free Download In Lead2pass (701-725)

This Lead2pass SY0-401 braindumps still valid, I got 979/1000 today. Thanks to Lead2pass.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 701
All of the following are valid cryptographic hash functions EXCEPT:

A.    RIPEMD.
B.    RC4.
C.    SHA-512.
D.    MD4.

Continue reading

[Lead2pass New] SY0-401 Exam Dump Free Updation Availabe In Lead2pass (701-725)

This Lead2pass SY0-401 braindumps still valid, I got 979/1000 today. Thanks to Lead2pass.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 701
All of the following are valid cryptographic hash functions EXCEPT:

A.    RIPEMD.
B.    RC4.
C.    SHA-512.
D.    MD4.

Continue reading

[Lead2pass New] SY0-401 Exam Dump Free Updation Availabe In Lead2pass (676-700)

At Lead2pass, we provide thoroughly reviewed CompTIA SY0-401 training resources which are the best for clearing SY0-401 test, and to get certified by CompTIA SY0-401.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 676
Several employee accounts appear to have been cracked by an attacker.
Which of the following should the security administrator implement to mitigate password cracking attacks? (Select TWO).

A.    Increase password complexity
B.    Deploy an IDS to capture suspicious logins
C.    Implement password history
D.    Implement monitoring of logins
E.    Implement password expiration
F.    Increase password length Continue reading

[Lead2pass New] Free Sharing Of Updated SY0-401 VCE And PDF Dumps From Lead2pass (651-675)

Lead2pass 2017 October New CompTIA SY0-401 Exam Dumps!

100% Free Download! 100% Pass Guaranteed!

Lead2pass has updated the latest version of CompTIA SY0-401 exam, which is a hot exam of CompTIA certification. It is Lead2pass CompTIA SY0-401 exam dumps that give you confidence to pass this certification exam in first attempt and with maximized score.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 651
A security administrator wants to check user password complexity.
Which of the following is the BEST tool to use?

A.    Password history
B.    Password logging
C.    Password cracker
D.    Password hashing

Continue reading

[Lead2pass New] Free Sharing Of Updated SY0-401 VCE And PDF Dumps From Lead2pass (626-650)

Lead2pass 2017 October New CompTIA SY0-401 Exam Dumps!

100% Free Download! 100% Pass Guaranteed!

How to 100% pass SY0-401 exam? Lead2pass SY0-401 dump is unparalleled in quality and is 100% guaranteed to make you pass SY0-401 exam. All the SY0-401 exam questions are the latest. Here are some free share of CompTIA SY0-401 dumps.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 626
The company’s sales team plans to work late to provide the Chief Executive Officer (CEO) with a special report of sales before the quarter ends. After working for several hours, the team finds they cannot save or print the reports.
Which of the following controls is preventing them from completing their work?

A.    Discretionary access control
B.    Role-based access control
C.    Time of Day access control
D.    Mandatory access control

Continue reading

[Lead2pass New] Free Sharing Of Updated SY0-401 VCE And PDF Dumps From Lead2pass (601-625)

Lead2pass 2017 October New CompTIA SY0-401 Exam Dumps!

100% Free Download! 100% Pass Guaranteed!

The SY0-401 braindumps are the latest, authenticated by expert and covering each and every aspect of SY0-401 exam. Comparing with others, our exam questions are rich in variety. We offer PDF dumps and SY0-401 VCE dumps. Welcome to choose.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 601
Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?

A.    DIAMETER
B.    RADIUS
C.    TACACS+
D.    Kerberos

Continue reading

[Lead2pass New] Free Sharing Of Updated SY0-401 VCE And PDF Dumps From Lead2pass (576-600)

Lead2pass 2017 October New CompTIA SY0-401 Exam Dumps!

100% Free Download! 100% Pass Guaranteed!

How to 100% pass SY0-401 exam? Lead2pass provides the guaranteed SY0-401 exam dumps to boost up your confidence in SY0-401 exam. Successful candidates have provided their reviews about our SY0-401 dumps. Now Lead2pass supplying the new version of SY0-401 VCE and PDF dumps. We ensure our SY0-401 exam questions are the most complete and authoritative compared with others’, which will ensure your SY0-401 exam pass.

Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/sy0-401.html

QUESTION 576
Which of the following hardware based encryption devices is used as a part of multi-factor authentication to access a secured computing system?

A.    Database encryption
B.    USB encryption
C.    Whole disk encryption
D.    TPM

Continue reading

Pages: 1 2 3