The Only Tip You Need: sy0 401 practice exam

Your success in CompTIA comptia security+ sy0 401 pdf is our sole target and we develop all our comptia security+ get certified get ahead sy0 401 study guide braindumps in a way that facilitates the attainment of this target. Not only is our comptia security+ study guide sy0 401 study material the best you can find, it is also the most detailed and the most updated. comptia sy0 401 Practice Exams for CompTIA Security+ sy0 401 braindump are written to the highest standards of technical accuracy.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q271. Which of the following ports should be opened on a firewall to allow for NetBIOS communication? (Select TWO). 

A. 110 

B. 137 

C. 139 

D. 143 

E. 161 

F. 443 

Answer: B,C 

Explanation: NetBIOS provides four distinct services: 

Name service for name registration and resolution (port: 137/udp) 

Name service for name registration and resolution (port: 137/tcp) 

Datagram distribution service for connectionless communication (port: 138/udp) 

Session service for connection-oriented communication (port: 139/tcp) 


Q272. Which of the following techniques describes the use of application isolation during execution to prevent system compromise if the application is compromised? 

A. Least privilege 

B. Sandboxing 

C. Black box 

D. Application hardening 

Answer:

Explanation: 

Sandboxing is the process of isolating a system before installing new applications on it so as to restrict any potential malware that may be embedded in the new application from being able to cause harm to production systems. 


Q273. Digital certificates can be used to ensure which of the following? (Select TWO). 

A. Availability 

B. Confidentiality 

C. Verification 

D. Authorization 

E. Non-repudiation 

Answer: B,E 

Explanation: 

Digital Signatures is used to validate the integrity of the message and the sender. Digital certificates refer to cryptography which is mainly concerned with Confidentiality, Integrity, Authentication, Nonrepudiation and Access Control. Nonrepudiation prevents one party from denying actions they carried out. 


Q274. Several employees submit the same phishing email to the administrator. The administrator finds that the links in the email are not being blocked by the company’s security device. Which of the following might the administrator do in the short term to prevent the emails from being received? 

A. Configure an ACL 

B. Implement a URL filter 

C. Add the domain to a block list 

D. Enable TLS on the mail server 

Answer:

Explanation: 

Blocking e-mail is the same as preventing the receipt of those e-mails and this is done by applying a filter. But the filter must be configured to block it. Thus you should add that specific domain from where the e-mails are being sent to the list of addresses that is to be blocked. 


Q275. During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR). 

A. 21 

B. 22 

C. 23 

D. 69 

E. 3389 

F. SSH 

G. Terminal services 

H. Rlogin 

I. Rsync 

J. Telnet 

Answer: B,C,F,J 

Explanation: 

The question states that Jane was able to establish a connection to an internal router. Typical 

ports and protocols used to connect to a router include the following: 

B, F: Port 22 which is used by SSH (Secure Shell). 

C, J: Port 23 which is used by Telnet. 

SSH and Telnet both provide command line interfaces for administering network devices such as 

routers and switches. 


Q276. An administrator wants to establish a WiFi network using a high gain directional antenna with a narrow radiation pattern to connect two buildings separated by a very long distance. Which of the following antennas would be BEST for this situation? 

A. Dipole 

B. Yagi 

C. Sector 

D. Omni 

Answer:

Explanation: 

A Yagi-Uda antenna, commonly known simply as a Yagi antenna, is a directional antenna consisting of multiple parallel dipole elements in a line, usually made of metal rods. It consists of a single driven element connected to the transmitter or receiver with a transmission line, and additional parasitic elements: a so-called reflector and one or more directors. The reflector element is slightly longer than the driven dipole, whereas the directors are a little shorter. This design achieves a very substantial increase in the antenna's directionality and gain compared to a simple dipole. 


Q277. Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a certificate? 

A. Certification authority 

B. Key escrow 

C. Certificate revocation list 

D. Registration authority 

Answer:

Explanation: 

A certificate authority (CA) is an organization that is responsible for issuing, revoking, and distributing certificates. 


Q278. Which of the following malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-ups based on browsing habits? 

A. Botnet 

B. Rootkit 

C. Adware 

D. Virus 

Answer:

Explanation: 

Adware is free software that is supported by advertisements. Common adware programs are toolbars, games and utilities. They are free to use, but require you to watch advertisements as long as the programs are open. Adware typically requires an active Internet connection to run. 


Q279. A security administrator has deployed all laptops with Self Encrypting Drives (SED) and enforces key encryption. Which of the following represents the greatest threat to maintaining data confidentiality with these devices? 

A. Full data access can be obtained by connecting the drive to a SATA or USB adapter bypassing the SED hardware. 

B. A malicious employee can gain the SED encryption keys through software extraction allowing access to other laptops. 

C. If the laptop does not use a Secure Boot BIOS, the SED hardware is not enabled allowing full data access. 

D. Laptops that are placed in a sleep mode allow full data access when powered back on. 

Answer:

Explanation: 


Q280. A server administrator notes that a legacy application often stops running due to a memory error. When reviewing the debugging logs, they notice code being run calling an internal process to exploit the machine. Which of the following attacks does this describe? 

A. Zero-day 

B. Buffer overflow 

C. Cross site scripting 

D. Malicious add-on 

Answer:

Explanation: 

This question describes a buffer overflow attack. 

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability.