This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection
[
https://www.mcitpdump.com
]
Export date: Thu Mar 28 9:23:56 2024 / +0000 GMT
COMPTIA NEWS: SY0-401 Exam Questions has been Updated Today! Get Latest SY0-401 VCE and SY0-401 PDF Instantly! Welcome to Download the Newest Braindump2go SY0-401 VCE&SY0-401 PDF Dumps: http://www.braindump2go.com/sy0-401.html (1220 Q&As) 2015 New Updated SY0-401 Exam Dumps Questions and Answers are all from CompTIA Official Exam Center! Some new questions added into this new released SY0-401 Dumps! Download SY0-401 Exam Dumps Full Version Now and Pass one time! Exam Code: SY0-401 SY0-401 Dump,SY0-401 PDF,SY0-401 VCE,SY0-401 Braindump,SY0-401 Study Guide,SY0-401 Study Guide PDF,SY0-401 Objectives,SY0-401 Practice Test,SY0-401 Practice Exam,SY0-401 Performance Based Questions,SY0-401 Exam Questions,SY0-401 Exam Dumps,SY0-401 Exam PDF,SY0-401 Dumps Free,SY0-401 Dumps PDF QUESTION 131 A. The request needs to be sent to the incident management team. Answer: C QUESTION 132 A. Incident management Answer: D QUESTION 133 A. Incident management Answer: C QUESTION 134 A. Application hardening Answer: C QUESTION 135 A. Risk transference Answer: B QUESTION 136 A. Patch Audit Policy Answer: BD QUESTION 137 A. Contact their manager and request guidance on how to best move forward Answer: B QUESTION 138 A. Risk transference Answer: D QUESTION 139 A. Procedure and policy management Answer: D QUESTION 140 A. Routine audits Answer: C
Exam Name: CompTIA Security+
Certification Provider: CompTIA
Corresponding Certification: CompTIA Security+
A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?
B. The request needs to be approved through the incident management process.
C. The request needs to be approved through the change management process.
D. The request needs to be sent to the change management team.
Explanation:
Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company's assets. Thus the actual switch configuration should first be subject to the change management approval.
Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk?
B. Clean desk policy
C. Routine audits
D. Change management
Explanation:
Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company's assets. This structured approach involves policies that should be in place and technological controls that should be enforced.
Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?
B. Server clustering
C. Change management
D. Forensic analysis
Explanation:
Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company's assets. In this case `performing updates to business critical systems.
The network administrator is responsible for promoting code to applications on a DMZ web server. Which of the following processes is being followed to ensure application integrity?
B. Application firewall review
C. Application change management
D. Application patch management
Explanation:
Change management is the structured approach that is followed to secure a company's assets. Promoting code to application on a SMZ web server would be change management.
Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails resulting in system outages?
B. Change management
C. Configuration management
D. Access control revalidation
Explanation:
Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company's assets. In this case `scheduled system patching'.
A security engineer is given new application extensions each month that need to be secured prior to implementation. They do not want the new extensions to invalidate or interfere with existing application security. Additionally, the engineer wants to ensure that the new requirements are approved by the appropriate personnel. Which of the following should be in place to meet these two goals? (Select TWO).
B. Change Control Policy
C. Incident Management Policy
D. Regression Testing Policy
E. Escalation Policy
F. Application Audit Policy
Explanation:
A backout (regression testing) is a reversion from a change that had negative consequences.
It could be, for example, that everything was working fi ne until you installed a service pack on a production machine, and then services that were normally available were no longer accessible. The backout, in this instance, would revert the system to the state that it was in before the service pack was applied. Backout plans can include uninstalling service packs, hotfi xes, and patches, but they can also include reversing a migration and using previous firmware. A key component to creating such a plan is identifying what events will trigger your implementing the backout.
A change control policy refers to the structured approach that is followed to secure a company's assets in the event of changes occurring.
A user has received an email from an external source which asks for details on the company's new product line set for release in one month. The user has a detailed spec sheet but it is marked "Internal Proprietary Information". Which of the following should the user do NEXT?
B. Contact the help desk and/or incident response team to determine next steps
C. Provide the requestor with the email information since it will be released soon anyway
D. Reply back to the requestor to gain their contact information and call them
Explanation:
This is an incident that has to be responded to by the person who discovered it- in this case the user. An incident is any attempt to violate a security policy, a successful penetration, a compromise of a system, or any unauthorized access to information. It's important that an incident response policy establish at least the following items:
Outside agencies that should be contacted or notified in case of an incident
Resources used to deal with an incident
Procedures to gather and secure evidence
List of information that should be collected about an incident
Outside experts who can be used to address issues if needed
Policies and guidelines regarding how to handle an incident
Since the spec sheet has been marked Internal Proprietary Information the user should refer the incident to the incident response team.
Incorrect Answers:
A: The manager may or may not be part of the incident response team.
C: The information has been marked Internal Proprietary Information and providing the information to the requestor would be in violation to the company.
D: You should have the incident response team handle the situation rather than addressing the issue yourself.
Which of the following is BEST carried out immediately after a security breach is discovered?
B. Access control revalidation
C. Change management
D. Incident management
Explanation:
Incident management is the steps followed when security incident occurs.
A security analyst informs the Chief Executive Officer (CEO) that a security breach has just occurred. This results in the Risk Manager and Chief Information Officer (CIO) being caught unaware when the CEO asks for further information. Which of the following strategies should be implemented to ensure the Risk Manager and CIO are not caught unaware in the future?
B. Chain of custody management
C. Change management
D. Incident management
Explanation:
incident management refers to the steps followed when events occur (making sure controls are in place to prevent unauthorized access to, and changes of, all IT assets).
The events that could occur include security breaches.
Requiring technicians to report spyware infections is a step in which of the following?
B. Change management
C. Incident management
D. Clean desk policy
Explanation:
Incident management refers to the steps followed when events occur (making sure controls are in place to prevent unauthorized access to, and changes of, all IT assets).
Braindump2go Promises All our customers: 100% All Exams Pass Or Full Money Back! Our experts have complied the fail proof SY0-401 Exam content to help all candidates pass your SY0-401 certification exam easily in the first attempt and score the top possible grades too.Do you want to sucess? Come to Braindump2go and our experts team will tell you what you need to do! SY0-401 Exam Dumps Full Version Download:
FREE DOWNLOAD: NEW UPDATED SY0-401 PDF Dumps & SY0-401 VCE Dumps from Braindump2go: http://www.braindump2go.com/sy0-401.html (1220 Q&A)
Post date: 2015-11-17 02:30:52
Post date GMT: 2015-11-17 02:30:52
Post modified date: 2015-11-17 02:30:52
Post modified date GMT: 2015-11-17 02:30:52
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com