pdf sy0-401 : Jun 2016 Edition

The SY0-401 computer software associated with Pass4sure may verify the testee whether or not to learn the particular CompTIA Security+ Certification knowledge securely as well as real solutions. The Pass4sure SY0-401 goods are contain several choose. Candidate can choose different package items for that SY0-401 pdf file or even SY0-401 vce computer software in accordance with their very own grasp of the SY0-401 situation.

2016 Jun SY0-401 study guide

Q151. Review the following diagram depicting communication between PC1 and PC2 on each side of a router. Analyze the network traffic logs which show communication between the two computers as captured by the computer with IP 10.2.2.10. 

DIAGRAM 

PC1 PC2 

[192.168.1.30]--------[INSIDE 192.168.1.1 router OUTSIDE 10.2.2.1]---------[10.2.2.10] LOGS 

10:30:22, SRC 10.2.2.1:3030, DST 10.2.2.10:80, SYN 

10:30:23, SRC 10.2.2.10:80, DST 10.2.2.1:3030, SYN/ACK 

10:30:24, SRC 10.2.2.1:3030, DST 10.2.2.10:80, ACK 

Given the above information, which of the following can be inferred about the above environment? 

A. 192.168.1.30 is a web server. 

B. The web server listens on a non-standard port. 

C. The router filters port 80 traffic. 

D. The router implements NAT. 

Answer: D 

Explanation: 

Network address translation (NAT) allows you to share a connection to the public Internet via a single interface with a single public IP address. NAT maps the private addresses to the public address. In a typical configuration, a local network uses one of the designated "private" IP address subnets. A router on that network has a private address (192.168.1.1) in that address space, and is also connected to the Internet with a "public" address (10.2.2.1) assigned by an Internet service provider. 


Q152. The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future? 

A. Job rotation 

B. Separation of duties 

C. Mandatory Vacations 

D. Least Privilege 

Answer: B 

Explanation: 

Separation of duties means that users are granted only the permissions they need to do their work and no more. More so it means that you are employing best practices. The segregation of duties and separation of environments is a way to reduce the likelihood of misuse of systems or information. A separation of duties policy is designed to reduce the risk of fraud and to prevent other losses in an organization. 


Q153. A security administrator wants to test the reliability of an application which accepts user provided parameters. The administrator is concerned with data integrity and availability. Which of the following should be implemented to accomplish this task? 

A. Secure coding 

B. Fuzzing 

C. Exception handling 

D. Input validation 

Answer: B 

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Q154. In order to secure additional budget, a security manager wants to quantify the financial impact of a one-time compromise. Which of the following is MOST important to the security manager? 

A. Impact 

B. SLE 

C. ALE 

D. ARO 

Answer: B 

Explanation: 


Q155. Data execution prevention is a feature in most operating systems intended to protect against which type of attack? 

A. Cross-site scripting 

B. Buffer overflow 

C. Header manipulation 

D. SQL injection 

Answer: B 

Explanation: 

Data Execution Prevention (DEP) is a security feature included in modern operating systems. It 

marks areas of memory as either "executable" or "nonexecutable", and allows only data in an 

"executable" area to be run by programs, services, device drivers, etc. It is known to be available 

in Linux, OS X, Microsoft Windows, iOS and Android operating systems. 

DEP protects against some program errors, and helps prevent certain malicious exploits, 

especially attacks that store executable instructions in a data area via a buffer overflow. 

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary 

data storage area) than it was intended to hold. Since buffers are created to contain a finite 

amount of data, the extra information - which has to go somewhere - can overflow into adjacent 

buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally 

through programming error, buffer overflow is an increasingly common type of security attack on 

data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger 

specific actions, in effect sending new instructions to the attacked computer that could, for 

example, damage the user's files, change data, or disclose confidential information. Buffer 

overflow attacks are said to have arisen because the C programming language supplied the 

framework, and poor programming practices supplied the vulnerability. 


SY0-401  exam guide

Down to date sy0-401 pdf:

Q156. Which of the following helps to apply the proper security controls to information? 

A. Data classification 

B. Deduplication 

C. Clean desk policy 

D. Encryption 

Answer: A 

Explanation: 

Information classification is done by confidentiality and comprises of three categories, namely: public use, internal use and restricted use. These categories make applying the appropriate policies and security controls practical. 


Q157. Which of the following devices would be the MOST efficient way to filter external websites for staff on an internal network? 

A. Protocol analyzer 

B. Switch 

C. Proxy 

D. Router 

Answer: C 

Explanation: 


Q158. When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength? 

A. SHA 

B. AES 

C. DES 

D. RSA 

Answer: D 

Explanation: 

RSA (an asymmetric algorithm) uses keys of a minimum length of 2048 bits. 


Q159. Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and corporate data is stolen. Which of the following would BEST prevent this from occurring again? 

A. Disable the wireless access and implement strict router ACLs. 

B. Reduce restrictions on the corporate web security gateway. 

C. Security policy and threat awareness training. 

D. Perform user rights and permissions reviews. 

Answer: C 

Explanation: 

BYOD (In this case Sara’s smart phone) involves the possibility of a personal device that is infected with malware introducing that malware to the network and security awareness training will address the issue of the company’s security policy with regard to BYOD. 


Q160. Which of the following relies on the use of shared secrets to protect communication? 

A. RADIUS 

B. Kerberos 

C. PKI 

D. LDAP 

Answer: A 

Explanation: 

Obfuscated passwords are transmitted by the RADIUS protocol via a shared secret and the MD5 hashing algorithm. 



see more SY0-401 dumps