What Does SY0-401 practice exam Mean?

Proper study guides for Renew CompTIA CompTIA Security+ Certification certified begins with CompTIA SY0-401 preparation products which designed to deliver the Verified SY0-401 questions by making you pass the SY0-401 test at your first time. Try the free SY0-401 demo right now.

2021 Mar SY0-401 actual exam

Q161. HOTSPOT 

The security administrator has installed a new firewall which implements an implicit DENY policy by default Click on the firewall and configure it to allow ONLY the following communication. 

1. The Accounting workstation can ONLY access the web server on the public network over the default HTTPS port. The accounting workstation should not access other networks. 

2. The HR workstation should be restricted to communicate with the Financial server ONLY, over the default SCP port 

3. The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port. 

Instructions: The firewall will process the rules in a top-down manner in order as a first match The port number must be typed in and only one port number can be entered per rule Type ANY for all ports. The original firewall configuration can be reset at any time by pressing the reset button. Once you have met the simulation requirements, click save and then Done to submit. 

Answer: 


Q162. Joe, a network security engineer, has visibility to network traffic through network monitoring tools. 

However, he’s concerned that a disgruntled employee may be targeting a server containing the company’s financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion? 

A. HIDS 

B. HIPS 

C. NIPS 

D. NIDS 

Answer:

Explanation: 

A host-based IDS (HIDS) is an intrusion detection system that runs as a service on a host computer system. It is used to monitor the machine logs, system events, and application activity for signs of intrusion. It is useful for detecting attacks that originate outside the organization as well as attacks by internal users logged on to the system. 


Q163. A system administrator has noticed vulnerability on a high impact production server. A recent update was made available by the vendor that addresses the vulnerability but requires a reboot of the system afterwards. Which of the following steps should the system administrator implement to address the vulnerability? 

A. Test the update in a lab environment, schedule downtime to install the patch, install the patch and reboot the server and monitor for any changes 

B. Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the patch, and monitor for any changes 

C. Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the update, reboot the server, and monitor for any changes 

D. Backup the server, schedule downtime to install the patch, installs the patch and monitor for any changes 

Answer:

Explanation: 

We have an update to apply to fix the vulnerability. The update should be tested first in a lab environment, not on the production server to ensure it doesn’t cause any other problems with the server. After testing the update, we should backup the server to enable us to roll back any changes in the event of any unforeseen problems with the update. The question states that the server will require a reboot. This will result in downtime so you should schedule the downtime before installing the patch. After installing the update, you should monitor the server to ensure it is functioning correctly. 


Q164. Which of the following uses port 22 by default? (Select THREE). 

A. SSH 

B. SSL 

C. TLS 

D. SFTP 

E. SCP 

F. FTPS 

G. SMTP 

H. SNMP 

Answer: A,D,E 

Explanation: 

SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22. 


Q165. Fuzzing is a security assessment technique that allows testers to analyze the behavior of software applications under which of the following conditions? 

A. Unexpected input 

B. Invalid output 

C. Parameterized input 

D. Valid output 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Up to date SY0-401 torrent:

Q166. Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access? 

A. Registration 

B. CA 

C. CRL 

D. Recovery agent 

Answer:

Explanation: 

Certificates or keys for the terminated employee should be put in the CRL. 

A certificate revocation list (CRL) is created and distributed to all CAs to revoke a certificate or 

key. 

By checking the CRL you can check if a particular certificate has been revoked. 


Q167. After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation? 

A. Information Security Awareness 

B. Social Media and BYOD 

C. Data Handling and Disposal 

D. Acceptable Use of IT Systems 

Answer:

Explanation: 

Education and training with regard to Information Security Awareness will reduce the risk of data leaks and as such forms an integral part of Security Awareness. By employing social engineering data can be leaked by employees and only when company users are made aware of the methods of social engineering via Information Security Awareness Training, you can reduce the risk of data leaks. 


Q168. Which of the following must be kept secret for a public key infrastructure to remain secure? 

A. Certificate Authority 

B. Certificate revocation list 

C. Public key ring 

D. Private key 

Answer:

Explanation: 

The private key, which is also called the secret key, must be kept secret. 


Q169. A security administrator is concerned about the strength of user’s passwords. The company does not want to implement a password complexity policy. Which of the following can the security Administrator implement to mitigate the risk of an online password attack against users with weak passwords? 

A. Increase the password length requirements 

B. Increase the password history 

C. Shorten the password expiration period 

D. Decrease the account lockout time 

Answer:

Explanation: 

Reducing the password expiration period will require passwords to be changed at the end of that period. A password needs to be changed if it doesn’t meet the compliance requirements of the company’s password policy, or is evidently insecure. It will also need to be changed if it has been reused, or due to possible compromise as a result of a system intrusion. This will give online password attackers less time to crack the weak passwords. 


Q170. Which of the following is the LEAST volatile when performing incident response procedures? 

A. Registers 

B. RAID cache 

C. RAM 

D. Hard drive 

Answer:

Explanation: 

An example of OOV in an investigation may be RAM, hard drive data, CDs/DVDs, and printouts. Of the options stated in the question the hard drive would be the least volatile. 



see more SY0-401 dumps