The Secret of SY0-401 actual exam

Want to know Ucertify SY0-401 Exam practice test features? Want to lear more about CompTIA CompTIA Security+ Certification certification experience? Study Realistic CompTIA SY0-401 answers to Replace SY0-401 questions at Ucertify. Gat a success with an absolute guarantee to pass CompTIA SY0-401 (CompTIA Security+ Certification) test on your first attempt.

2021 Mar SY0-401 exam

Q601. Which of the following would be used when a higher level of security is desired for encryption key storage? 

A. TACACS+ 

B. L2TP 

C. LDAP 

D. TPM 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Q602. Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees to have secure remote access to certain internal network services such as file servers? 

A. Packet filtering firewall 

B. VPN gateway 

C. Switch 

D. Router 

Answer:

Explanation: 

VPNs are usually employed to allow remote access users to connect to and access the network, and offer connectivity between two or more private networks or LANs. A VPN gateway (VPN router) is a connection point that connects two LANs via a nonsecure network such as the Internet. 


Q603. Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mis-configurations or faults? 

A. VLAN 

B. Protocol security 

C. Port security 

D. VSAN 

Answer:

Explanation: 

A storage area network (SAN) is a secondary network that offers storage isolation by consolidating storage devices such as hard drives, drive arrays, optical jukeboxes, and tape libraries. Virtualization can be used to further enhance the security of a SAN by using switches to create a VSAN. These switches act as routers controlling and filtering traffic into and out of the VSAN while allowing unrestricted traffic within the VSAN. 


Q604. A security administrator must implement a network that is immune to ARP spoofing attacks. Which of the following should be implemented to ensure that a malicious insider will not be able to successfully use ARP spoofing techniques? 

A. UDP 

B. IPv6 

C. IPSec 

D. VPN 

Answer:

Explanation: 


Q605. While previously recommended as a security measure, disabling SSID broadcast is not effective against most attackers because network SSIDs are: 

A. no longer used to authenticate to most wireless networks. 

B. contained in certain wireless packets in plaintext. 

C. contained in all wireless broadcast packets by default. 

D. no longer supported in 802.11 protocols. 

Answer:

Explanation: 

The SSID is still required for directing packets to and from the base station, so it can be discovered using a wireless packet sniffer. 


Renewal SY0-401 practice:

Q606. Which of the following techniques enables a highly secured organization to assess security weaknesses in real time? 

A. Access control lists 

B. Continuous monitoring 

C. Video surveillance 

D. Baseline reporting 

Answer:

Explanation: 

Continuous monitoring point toward the never-ending review of what resources a user actually accesses, which is critical for preventing insider threats. Because the process is never-ending, assessments happen in real time. 

Topic 6, Cryptography 


Q607. Joe is the accounts payable agent for ABC Company. Joe has been performing accounts payable function for the ABC Company without any supervision. Management has noticed several new accounts without billing invoices that were paid. Which of the following is the BEST management option for review of the new accounts? 

A. Mandatory vacation 

B. Job rotation 

C. Separation of duties 

D. Replacement 

Answer:

Explanation: 


Q608. A recent intrusion has resulted in the need to perform incident response procedures. The incident response team has identified audit logs throughout the network and organizational systems which hold details of the security breach. Prior to this incident, a security consultant informed the company that they needed to implement an NTP server on the network. Which of the following is a problem that the incident response team will likely encounter during their assessment? 

A. Chain of custody 

B. Tracking man hours 

C. Record time offset 

D. Capture video traffic 

Answer:

Explanation: 

It is quite common for workstation as well as server times to be off slightly from actual time. Since a forensic investigation is usually dependent on a step-by-step account of what has happened, being able to follow events in the correct time sequence is critical. Because of this, it is imperative to record the time offset on each affected machine during the investigation. One method of assisting with this is to add an entry to a log file and note the time that this was done and the time associated with it on the system. There is no mention that this was done by the incident response team. 


Q609. The security team would like to gather intelligence about the types of attacks being launched against the organization. Which of the following would provide them with the MOST information? 

A. Implement a honeynet 

B. Perform a penetration test 

C. Examine firewall logs 

D. Deploy an IDS 

Answer:

Explanation: 

A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. The Honeynet Project, a non-profit research organization dedicated to computer security and information sharing, actively promotes the deployment of honeynets. In addition to the honey pots, a honeynet usually has real applications and services so that it seems like a normal network and a worthwhile target. However, because the honeynet doesn't actually serve any authorized users, any attempt to contact the network from without is likely an illicit attempt to breach its security, and any outbound activity is likely evidence that a system has been compromised. For this reason, the suspect information is much more apparent than it would be in an actual network, where it would have to be found amidst all the legitimate network data. Applications within a honeynet are often given names such as "Finances" or "Human Services" to make them sound appealing to the attacker. 

A virtual honeynet is one that, while appearing to be an entire network, resides on a single server. 


Q610. A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN? 

A. WPA2 CCMP 

B. WPA 

C. WPA with MAC filtering 

D. WPA2 TKIP 

Answer:

Explanation: 

CCMP is the standard encryption protocol for use with the WPA2 standard and is much more secure than the WEP protocol and TKIP protocol of WPA. CCMP provides the following security services: Data confidentiality; ensures only authorized parties can access the information Authentication; provides proof of genuineness of the user Access control in conjunction with layer management 

Because CCMP is a block cipher mode using a 128-bit key, it is secure against attacks to the 264 steps of operation. 



see more SY0-401 dumps