sy0 401 dump (251 to 260)

Want to know Exambible sy0 401 practice exam Exam practice test features? Want to lear more about CompTIA CompTIA Security+ Certification certification experience? Study High value CompTIA sy0 401 vce answers to Far out comptia sy0 401 questions at Exambible. Gat a success with an absolute guarantee to pass CompTIA sy0 401 dump (CompTIA Security+ Certification) test on your first attempt.


Free VCE & PDF File for CompTIA SY0-401 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on:

Q251. Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection? 

A. Sign in and sign out logs 

B. Mantrap 

C. Video surveillance 




Mantraps are designed to contain an unauthorized, potentially hostile person/individual physically until authorities arrive. Mantraps are typically manufactured with bulletproof glass, high-strength doors, and locks and to allow the minimal amount of individuals depending on its size. Some mantraps even include scales that will weigh the person. The doors are designed in such a way as to open only when the mantrap is occupied or empty and not in-between. This means that the backdoor must first close before the front door will open. Mantraps are in most cases also combined with guards. This is the most physical protection any one measure will provide. 

Q252. Ann, a security analyst, is preparing for an upcoming security audit. To ensure that she identifies unapplied security controls and patches without attacking or compromising the system, Ann would use which of the following? 

A. Vulnerability scanning 

B. SQL injection 

C. Penetration testing 

D. Antivirus update 



A vulnerability scan is the process of scanning the network and/or I.T. infrastructure for threats and vulnerabilities. The threats and vulnerabilities are then evaluated in a risk assessment and the necessary actions taken to resolve and vulnerabilities. A vulnerability scan scans for known weaknesses such as missing patches or security updates. 

A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. 


For each of the given items, select the appropriate authentication category from the dropdown choices. 

Instructions: When you have completed the simu-lation, please select the Done button to submit. 


Q254. The method to provide end users of IT systems and applications with requirements related to acceptable use, privacy, new threats and trends, and use of social networking is: 

A. Security awareness training. 

B. BYOD security training. 

C. Role-based security training. 

D. Legal compliance training. 



Security awareness and training are critical to the success of a security effort. They include explaining policies, procedures, and current threats to both users and management. 

Q255. At the outside break area, an employee, Ann, asked another employee to let her into the building because her badge is missing. Which of the following does this describe? 

A. Shoulder surfing 

B. Tailgating 

C. Whaling 

D. Impersonation 



Although Ann is an employee and therefore authorized to enter the building, she does not have her badge and therefore strictly she should not be allowed to enter the building. Just as a driver can tailgate another driver’s car by following too closely, in the security sense, tailgating means to compromise physical security by following somebody through a door meant to keep out intruders. Tailgating is actually a form of social engineering, whereby someone who is not authorized to enter a particular area does so by following closely behind someone who is authorized. 

Q256. Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability? 

A. Twofish 

B. Diffie-Hellman 





Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography (with plain Galois fields as a basis) is the same level of security provided by keys of smaller size. 

Q257. Which of the following provides data the best fault tolerance at the LOWEST cost? 

A. Load balancing 

B. Clustering 

C. Server virtualization 

D. RAID 6 



RAID, or redundant array of independent disks (RAID). RAID allows your existing servers to have more than one hard drive so that if the main hard drive fails, the system keeps functioning. RAID can achieve fault tolerance using software which can be done using the existing hardware and software thus representing the lowest cost option. 

Q258. To ensure compatibility with their flagship product, the security engineer is tasked to recommend an encryption cipher that will be compatible with the majority of third party software and hardware vendors. Which of the following should be recommended? 


B. MD5 

C. Blowfish 




Explanation: AES (Advanced Encryption Standard) has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES) which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. AES is used to encrypt data, not to verify data integrity. 

Q259. An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender? 


B. Non-repudiation 

C. Trust models 

D. Recovery agents 



Nonrepudiation prevents one party from denying actions they carried out. This means that the identity of the email sender will not be repudiated. 

Q260. Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure? 

A. Hardware load balancing 


C. A cold site 

D. A host standby 



Fault tolerance is the ability of a system to sustain operations in the event of a component failure. Fault-tolerant systems can continue operation even though a critical component, such as a disk drive, has failed. This capability involves overengineering systems by adding redundant components and subsystems. RAID can achieve fault tolerance using software which can be done using the existing hardware and software.