[Free] 2018(Mar) EnsurePass Testinsides CompTIA SY0-401 Dumps with VCE and PDF 911-920

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 911 – (Topic 5)

A security administrator wants to check user password complexity. Which of the following is the

BEST tool to use?

  1. Password history

  2. Password logging

  3. Password cracker

  4. Password hashing

Answer: C Explanation:

The most important countermeasure against password crackers is to use long, complex passwords, which are changed regularly. Password-cracking tools compare hashes from potential passwords with the hashes stored in the accounts database. Each potential password is hashed, and that hash value is compared with the accounts database. If a match is found, the password-cracker tool has discovered a password for a user account.

Question No: 912 – (Topic 5)

An organization has introduced token-based authentication to system administrators due to risk of password compromise. The tokens have a set of numbers that automatically change every 30 seconds. Which of the following type of authentication mechanism is this?

  1. TOTP

  2. Smart card

  3. CHAP

  4. HOTP

Answer: A Explanation:

Time-based one-time password (TOTP) tokens are devices or applications that generate passwords at fixed time intervals. In this case, it’s every 30 seconds.

Question No: 913 – (Topic 5)

A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer will have very different job requirements and use unique tools and applications in their job. Which of the following is MOST appropriate to use?

  1. Role-based privileges

  2. Credential management

  3. User assigned privileges

  4. User access

Answer: A Explanation:

In this question, we have engineers who require different tools and applications according to their specialized job function. We can therefore use the Role-Based Access Control model.

Role-Based Access Control (RBAC) models approach the problem of access control based on established roles in an organization. RBAC models implement access by job function or by responsibility. Each employee has one or more roles that allow access to specific information. If a person moves from one role to another, the access for the previous role

will no longer be available.

Instead of thinking “Denise needs to be able to edit files,” RBAC uses the logic “Editors need to be able to edit files” and “Denise is a member of the Editors group.” This model is always good for use in an environment in which there is high employee turnover.

Question No: 914 – (Topic 5)

Which of the following is a BEST practice when dealing with user accounts that will only need to be active for a limited time period?

  1. When creating the account, set the account to not remember password history.

  2. When creating the account, set an expiration date on the account.

  3. When creating the account, set a password expiration date on the account.

  4. When creating the account, set the account to have time of day restrictions.

Answer: B Explanation:

Disablement is a secure feature to employ on user accounts for temporary workers, interns, or consultants. It automatically disables a user account or causes the account to expire at a specific time and on a specific day.

Question No: 915 – (Topic 5)

Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?




  4. Kerberos

Answer: C Explanation:

TACACS is an authentication, authorization, and accounting (AAA) service that makes us of TCP only.

Question No: 916 – (Topic 5)

A password history value of three means which of the following?

  1. Three different passwords are used before one can be reused.

  2. A password cannot be reused once changed for three years.

  3. After three hours a password must be re-entered to continue.

  4. The server stores passwords in the database for three days.

Answer: A Explanation:

Password History defines the number of unique new passwords a user must use before an old password can be reused.

Question No: 917 – (Topic 5)

The security administrator notices a user logging into a corporate Unix server remotely as root. Which of the following actions should the administrator take?

  1. Create a firewall rule to block SSH

  2. Delete the root account

  3. Disable remote root logins

  4. Ensure the root account has a strong password

Answer: C Explanation:

Remote users log in to Unix or Linux servers by using SSH. Although SSH is secure, allowing remote access as root is a security risk.

One of the biggest security holes you could open on a Unix or Linux server is to allow directly logging in as root through SSH, because any cracker can attempt to brute force your root password and potentially get access to your system if they can figure out your password.

It’s much better to have a separate account that you regularly use and simply sudo to root when necessary.

You should disable root ssh access by editing /etc/ssh/sshd_config to contain: PermitRootLogin no

Question No: 918 – (Topic 5)

Which of the following should be done before resetting a user’s password due to expiration?

  1. Verify the user’s domain membership.

  2. Verify the user’s identity.

  3. Advise the user of new policies.

  4. Verify the proper group membership.

Answer: B Explanation:

When resetting a password, users have to establish their identity by answering a series of personal questions, using a hardware authentication token, or responding to a password notification e-mail. Users can then either specify a new, unlocked password, or ask that a randomly generated one be provided. This can be done from their workstation login prompt, or through a telephone call.

Question No: 919 – (Topic 5)

An auditing team has found that passwords do not meet best business practices. Which of the following will MOST increase the security of the passwords? (Select TWO).

  1. Password Complexity

  2. Password Expiration

  3. Password Age

  4. Password Length

  5. Password History

Answer: A,D Explanation:

Passwords should have the strength to avoid discovery through attack, but it should also be easy enough for the user to remember. The length and complexity of a password combined are vital factors in defining a password’s strength.

Question No: 920 – (Topic 5)

Which of the following protocols provides for mutual authentication of the client and server?

  1. Two-factor authentication

  2. Radius

  3. Secure LDAP

  4. Biometrics

Answer: C Explanation:

C: The LDAP directory service is based on a client-server model. The function of LDAP is to enable access to an existing directory. Because it is a client-server model it makes provision for mutual authentication between the two parties.

100% Ensurepass Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Ensurepass Free Guaranteed!
SY0-401 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com