CompTIA SY0-401 Security+ is the industry leader in information technology, and getting certified by them is a guaranteed way to succeed with IT careers. http://www.lead4pass.com/SY0-401.html We help you do exactly that with our high quality CompTIA SY0-401 Security+ Certification Exam training materials.

Question No : 1
A Windows-based computer is infected with malware and is running too slowly to boot and run a malware scanner. Which of the following is the BEST way to run the malware scanner?
A. Kill all system processes
B. Enable the firewall
C. Boot from CD/USB
D. Disable the network connection
Answer: C

Explanation:
Antivirus companies frequently create boot discs you can use to scan and repair your computer. These tools can be burned to a CD or DVD or installed onto a USB drive. You can then SY0-401 restart your computer and boot from the removable media. A special antivirus environment will load where your computer can be scanned and repaired.
SY0-401
Incorrect Options:
A: Kill all system processes will stop system processes, and could have a negative effect on the system. It is not the BEST way to run the malware scanner
B: The basic purpose of a firewall is to isolate one network from another. It is not the BEST way to run the malware scanner.
D: Disabling the network connection will not allow for the BEST way to run the malware scanner.

Question No : 2
A company determines a need for additional protection from rogue devices plugging into physical ports around the building.
Which of the following provides the highest degree of protection SY0-401 from unauthorized wired network access?
A. Intrusion Prevention Systems
B. MAC filtering
C. Flood guards
D. 802.1x
Answer: D
Explanation:
IEEE 802.1x is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols and provides an authentication mechanism to wireless devices connecting to a LAN or WLAN.

Question No : 3
A malicious program modified entries in the SY0-401 LMHOSTS file of an infected system. Which of the following protocols would have been affected by this?
A. ICMP
B. BGP
C. NetBIOS
D. DNS
Answer: C

Explanation:
The LMHOSTS file provides a NetBIOS name resolution method that can be used for small networks that do not use a WINS server. NetBIOS has been adapted to run on top of TCP/IP, and is still extensively used for name resolution and registration in Windows-based environments.

Question No : 4
Multi-tenancy is a concept found in which of the following?
A. Full disk encryption
B. Removable media
C. Cloud computing
D. Data loss prevention
Answer: C

Explanation:
One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This “multitenant” nature means that SY0-401 workloads from different clients can be on the same system, and a flaw in implementation could compromise security.

Question No : 5
An organization does not want the wireless network name to be easily discovered. Which of the following software features should be configured on the access points?
A. SSID broadcast
B. MAC filter
C. WPA2
D. Antenna placement
Answer: A
Explanation:
Numerous networks broadcast their name (known as an SSID broadcast) to reveal their presence.

Question No : 6
Which of the following technologies can store multi-tenant data with different security requirements?
A. Data loss prevention
B. Trusted platform module
C. Hard drive encryption
D. Cloud computing
Answer: D

Explanation:
One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This “multitenant” nature means that SY0-401 workloads from different clients can be on the same system, and a flaw in implementation could compromise security.

Question No : 7
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
A. Packet Filter Firewall
B. Stateful Firewall
C. Proxy Firewall
D. Application Firewall
Answer: B
Explanation:
Stateful inspections occur at all levels of the network.

Question No : 8
A network administrator needs to provide daily network usage reports on all layer 3 devices without compromising any data while gathering the information. Which of the following would be configured to provide these reports?
A. SNMP
B. SNMPv3
C. ICMP
D. SSH
Answer: B
Explanation:
Currently, SNMP is predominantly used for monitoring and performance management. SNMPv3 defines a secure version of SNMP and also facilitates remote configuration of the SY0-401 SNMP entities.

Read more: http://www.lead4pass.com/SY0-401.html The CompTIA SY0-401 exam pdf practice questions and answers covers all the knowledge points of the real exam. We update our product frequently so our customer can always have the latest version of the brain dumps.

Reference: https://certification.comptia.org/certifications/security

Download free Cisco SY0-401 exam pdf files: https://drive.google.com/open?id=0B7LFs7RuvDV4NGNITDYwZ2EyV00

Watch the video to learn more: