[Free] 2018(Mar) EnsurePass Testinsides CompTIA SY0-401 Dumps with VCE and PDF 971-980

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 971 – (Topic 5)

Which of the following protocols is MOST likely to be leveraged by users who need additional information about another user?

  1. LDAP


  3. Kerberos


Answer: A


A ‘directory’ contains information about users.

The Lightweight Directory Access Protocol (LDAP) is a directory service protocol that runs on a layer above the TCP/IP stack. It provides a mechanism used to connect to, search, and modify Internet directories.

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network. As examples, directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number.

Question No: 972 – (Topic 5)

Which of the following is an important implementation consideration when deploying a wireless network that uses a shared password?

  1. Authentication server

  2. Server certificate

  3. Key length

  4. EAP method

Answer: C Explanation:

Key length is the main issue of concern since the wireless network uses a shared password. With risks of shared passwords makes the length of the password a crucial factor to risk mitigation.

Question No: 973 – (Topic 5)

A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales department?

  1. Time of day restrictions

  2. Group based privileges

  3. User assigned privileges

  4. Domain admin restrictions

Answer: B Explanation:

The question states that the sales department has a high employee turnover. You can assign permissions to access resources either to a user or a group. The most efficient way is to assign permissions to a group (group based privileges). Then when a new employee starts, you simply add the new user account to the appropriate groups. The user then inherits all the permissions assigned to the groups.

Question No: 974 – (Topic 5)

LDAP and Kerberos are commonly used for which of the following?

  1. To perform queries on a directory service

  2. To store usernames and passwords for Federated Identity

  3. To sign SSL wildcard certificates for subdomains

  4. To utilize single sign-on capabilities

Answer: D Explanation:

Single sign-on is usually achieved via the Lightweight Directory Access Protocol (LDAP), although Kerberos can also be used.

Question No: 975 – (Topic 5)

An insurance company requires an account recovery process so that information created by an employee can be accessed after that employee is no longer with the firm. Which of the following is the BEST approach to implement this process?

  1. Employee is required to share their password with authorized staff prior to leaving the firm

  2. Passwords are stored in a reversible form so that they can be recovered when needed

  3. Authorized employees have the ability to reset passwords so that the data is accessible

  4. All employee data is exported and imported by the employee prior to them leaving the firm

Answer: C Explanation:

Since a user’s password isn’t stored on most operating systems (only a hash value is kept), most operating systems allow the administrator (or authorized person in this case) to change the value then the information/files/documents can be accessed. This is the safest way of recovery by an authorized person and is not dependent on those who leave the firm.

Question No: 976 – (Topic 5)

Which of the following practices reduces the management burden of access management?

  1. Password complexity policies

  2. User account audit

  3. Log analysis and review

  4. Group based privileges

Answer: D

Explanation: Granting permissions to all members of a group is quicker than individually assigning them to each user. This means an administrator will spend less time on assigning permissions to users who require the same access privileges.

Question No: 977 – (Topic 5)

An information bank has been established to store contacts, phone numbers and other records.

An application running on UNIX would like to connect to this index server using port 88. Which of the following authentication services would this use this port by default?

  1. Kerberos


  3. Radius

  4. LDAP

Answer: A

Explanation: Kerberos makes use of port 88.

Question No: 978 – (Topic 5)

A company requires that a user’s credentials include providing something they know and something they are in order to gain access to the network. Which of the following types of authentication is being described?

  1. Biometrics

  2. Kerberos

  3. Token

  4. Two-factor

Answer: D

Explanation: Two-factor authentication is when two different authentication factors are provided for authentication purposes. In this case, “something they know and something they are”.

Question No: 979 – (Topic 5)

RADIUS provides which of the following?

  1. Authentication, Authorization, Availability

  2. Authentication, Authorization, Auditing

  3. Authentication, Accounting, Auditing

  4. Authentication, Authorization, Accounting

Answer: D Explanation:

The Remote Authentication Dial In User Service (RADIUS) networking protocol offers centralized Authentication, Authorization, and Accounting (AAA) management for users who make use of a network service. It is for this reason that A, B, and C: are incorrect.

References: http://en.wikipedia.org/wiki/RADIUS

Question No: 980 – (Topic 5)

Which of the following passwords is the LEAST complex?

  1. MyTrain!45

  2. Mytr@in!!

  3. MyTr@in12

  4. MyTr@in#8

Answer: B Explanation:

Password policies often enforce a minimum of three out of four standard character types, which includes uppercase and lowercase letters, numbers, and symbols. Although this option includes three of the four character types, it does not include numbers, which makes it less complex than the other options.

100% Ensurepass Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Ensurepass Free Guaranteed!
SY0-401 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com