Examples of actualtests sy0-401

It is impossible to pass CompTIA SY0-401 exam without any help in the short term. Come to Exambible soon and find the most advanced, correct and guaranteed CompTIA SY0-401 practice questions. You will get a surprising result by our Renewal CompTIA Security+ Certification practice guides.

2021 Aug comptia security+ all-in-one exam guide (exam sy0-401) pdf:

Q71. A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the following protocols should be used instead of Telnet? 





Answer: B 


SSH transmits both authentication traffic and data in a secured encrypted form, whereas Telnet transmits both authentication credentials and data in clear text. 

Q72. Which of the following components MUST be trusted by all parties in PKI? 

A. Key escrow 

B. CA 

C. Private key 

D. Recovery key 

Answer: B 


A certificate authority (CA) is an organization that is responsible for issuing, revoking, and 

distributing certificates. In a simple trust model all parties must trust the CA. 

In a more complicated trust model all parties must trust the Root CA. 

Q73. An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal? 

A. Unified Threat Management 

B. Virtual Private Network 

C. Single sign on 

D. Role-based management 

Answer: A 


When you combine a firewall with other abilities (intrusion prevention, antivirus, content filtering, etc.), what used to be called an all-in-one appliance is now known as a unified threat management (UTM) system. The advantages of combining everything into one include a reduced learning curve (you only have one product to learn), a single vendor to deal with, and—typically—reduced complexity. 

Q74. A security analyst informs the Chief Executive Officer (CEO) that a security breach has just occurred. This results in the Risk Manager and Chief Information Officer (CIO) being caught unaware when the CEO asks for further information. Which of the following strategies should be implemented to ensure the Risk Manager and CIO are not caught unaware in the future? 

A. Procedure and policy management 

B. Chain of custody management 

C. Change management 

D. Incident management 

Answer: D 


incident management refers to the steps followed when events occur (making sure controls are in place to prevent unauthorized access to, and changes of, all IT assets). The events that could occur include security breaches. 

Q75. Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow incoming SFTP connections? 

A. 21/UDP 

B. 21/TCP 

C. 22/UDP 

D. 22/TCP 

Answer: D 


SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22. 

SY0-401 exams

Renewal pass4sure security+ sy0-401:

Q76. After a company has standardized to a single operating system, not all servers are immune to a well-known OS vulnerability. Which of the following solutions would mitigate this issue? 

A. Host based firewall 

B. Initial baseline configurations 

C. Discretionary access control 

D. Patch management system 

Answer: D 


A patch is an update to a system. Sometimes a patch adds new functionality; in other cases, it corrects a bug in the software. Patch Management can thus be used to fix security problems discovered within the OS thus negating a known OS vulnerability. 

Q77. Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company? 

A. Privacy Policy 

B. Least Privilege 

C. Acceptable Use 

D. Mandatory Vacations 

Answer: D 


A mandatory vacation policy requires all users to take time away from work to refresh. But not only does mandatory vacation give the employee a chance to refresh, but it also gives the company a chance to make sure that others can fill in any gaps in skills and satisfies the need to have replication or duplication at all levels as well as an opportunity to discover fraud. 

Q78. Which of the following security concepts identifies input variables which are then used to perform boundary testing? 

A. Application baseline 

B. Application hardening 

C. Secure coding 

D. Fuzzing 

Answer: D 


Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 

Q79. A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion. Which of the following technologies would BEST be suited to accomplish this? 

A. Transport Encryption 

B. Stream Encryption 

C. Digital Signature 

D. Steganography 

Answer: D 


Q80. Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches? 




D. Kerberos 

Answer: C 


TACACS+ is an authentication, authorization, and accounting (AAA) service that makes us of TCP only. 

see more SY0-401 dumps