[Free] 2018(Aug) Dumps4cert CompTIA SY0-401 Dumps with VCE and PDF Download 751-760

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 751 – (Topic 4)

Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on employees#39; computers?

  1. Least privilege accounts

  2. Host-based firewalls

  3. Intrusion Detection Systems

  4. Application white listing

Answer: D Explanation:

Application whitelisting is a security stance that prohibits unauthorized software from being able to execute unless it is on the preapproved exception list: the whitelist. This prevents any and all software, including malware, from executing unless it is on the whitelist. This can help block zero-day attacks, which are new attacks that exploit flaws or vulnerabilities in targeted systems and applications that are unknown or undisclosed to the world in general.

Question No: 752 – (Topic 4)

Methods to test the responses of software and web applications to unusual or unexpected inputs are known as:

  1. Brute force.

  2. HTML encoding.

  3. Web crawling.

  4. Fuzzing.

Answer: D Explanation:

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks.

Question No: 753 – (Topic 4)

Pete, the system administrator, has concerns regarding users losing their company provided smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his concerns?

  1. Enforce device passwords.

  2. Use remote sanitation.

  3. Enable GPS tracking.

  4. Encrypt stored data.

Answer: C Explanation:

Global Positioning System (GPS) tracking can be used to identify its location of a stolen device and can allow authorities to recover the device. However, for GPS tracking to work, the device must have an Internet connection or a wireless phone service over which to send its location information.

Question No: 754 – (Topic 4)

The chief Risk officer is concerned about the new employee BYOD device policy and has requested the security department implement mobile security controls to protect corporate data in the event that a device is lost or stolen. The level of protection must not be compromised even if the communication SIM is removed from the device. Which of the following BEST meets the requirements? (Select TWO)

  1. Asset tracking

  2. Screen-locks

  3. GEO-Tracking

  4. Device encryption

Answer: A,D Explanation:

A: Asset tracking is the process of maintaining oversight over inventory, and ensuring that a device is still in the possession of the assigned authorized user.

D: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen.

Question No: 755 – (Topic 4)

Which of the following is the term for a fix for a known software problem?

  1. Skiff

  2. Patch

  3. Slipstream

  4. Upgrade

Answer: B Explanation:

Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps protect a systems from newly discovered attacks and vulnerabilities.

Question No: 756 – (Topic 4)

Which of the following should be enabled in a laptop’s BIOS prior to full disk encryption?

  1. USB

  2. HSM

  3. RAID

  4. TPM

Answer: D Explanation:

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates.

Question No: 757 – (Topic 4)

A user has several random browser windows opening on their computer. Which of the following programs can be installed on his machine to help prevent this from happening?

  1. Antivirus

  2. Pop-up blocker

  3. Spyware blocker

  4. Anti-spam

Answer: B Explanation:

Pop-up blockers prevent websites from opening new browser windows without the users consent. These are often used for advertisements but can also be used to distribute malicious code.

Question No: 758 – (Topic 4)

Full disk encryption is MOST effective against which of the following threats?

  1. Denial of service by data destruction

  2. Eavesdropping emanations

  3. Malicious code

  4. Theft of hardware

Answer: D Explanation:

Full-disk encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. However, it does not prevent the theft of hardware it only protects data should the device be stolen.

Question No: 759 – (Topic 4)

Which of the following would be used when a higher level of security is desired for encryption key storage?

  1. TACACS

  2. L2TP

  3. LDAP

  4. TPM

Answer: D Explanation:

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates.

Question No: 760 – (Topic 4)

Which of the following pseudocodes can be used to handle program exceptions?

  1. If program detects another instance of itself, then kill program instance.

  2. If user enters invalid input, then restart program.

  3. If program module crashes, then restart program module.

  4. If user’s input exceeds buffer length, then truncate the input.

Answer: C Explanation:

Exception handling is an aspect of secure coding. When errors occur, the system should revert back to a secure state. This must be coded into the system by the programmer, and should capture all errors and exceptions that could cause the application or its modules to crash. Restarting the application or module would ensure that the application reverts back to a secure state.

100% Dumps4cert Free Download!
SY0-401 PDF
100% Dumps4cert Pass Guaranteed!
SY0-401 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No