All About SY0-401 exam answers Apr 2021

Currently you the authentic environment over the research since you within authentic audit. Should you be inexperienced and want to increase your educative know-how as well as skilled expertise, thus Testking BrainDumps Pack will give you step-by-step training for your own wish objectives. Buying CompTIA SY0-401 Cooking Puts Audit Perform Test out Products and services be the priceless purchase of your own potential Authorized Skilled Profession. You will complete SY0-401 Checks inside 1st look at right after exploring Audit Perform Test out Components and SY0-401 Mental Puts. All of our CompTIA SY0-401 Audit Pdf Research Queries and SY0-401 appear in printable and 24/7 down-loadable edition. All of our CompTIA SY0-401 Audit Prep Training is intended using a company involving Authorized Professionals. All of our CompTIA SY0-401 Pdf Research Queries happen to be up to date regularly depending on most up-to-date Accreditation Audit Training Go over.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

2021 Apr SY0-401 exam answers

Q91. In regards to secure coding practices, why is input validation important? 

A. It mitigates buffer overflow attacks. 

B. It makes the code more readable. 

C. It provides an application configuration baseline. 

D. It meets gray box testing standards. 

Answer:

Explanation: 

Buffer overflow is an exploit at programming error, bugs and flaws. It occurs when an application is fed more input data than it is programmed to handle. This may cause the application to terminate or to write data beyond the end of the allocated space in memory. The termination of the application may cause the system to send the data with temporary access to privileged levels in the system, while overwriting can cause important data to be lost. Proper error and exception handling and input validation will help prevent Buffer overflow exploits. 


Q92. During an anonymous penetration test, Jane, a system administrator, was able to identify a shared print spool directory, and was able to download a document from the spool. Which statement BEST describes her privileges? 

A. All users have write access to the directory. 

B. Jane has read access to the file. 

C. All users have read access to the file. 

D. Jane has read access to the directory. 

Answer:

Explanation: 

The question states that Jane was able to download a document from the spool directory. To view and download the document, Jane must have at least Read access to the file. The fact that the document belonged to someone else suggests that all users have read access to the file. 


Q93. How must user accounts for exiting employees be handled? 

A. Disabled, regardless of the circumstances 

B. Disabled if the employee has been terminated 

C. Deleted, regardless of the circumstances 

D. Deleted if the employee has been terminated 

Answer:

Explanation: 

You should always disable an employee’s account as soon as they leave. The employee knows the username and password of the account and could continue to log in for potentially malicious purposes. Disabling the account will ensure that no one can log in using that account. 


Q94. An internal auditor is concerned with privilege creep that is associated with transfers inside the company. Which mitigation measure would detect and correct this? 

A. User rights reviews 

B. Least privilege and job rotation 

C. Change management 

D. Change Control 

Answer:

Explanation: 

A privilege audit is used to determine that all groups, users, and other accounts have the appropriate privileges assigned according to the policies of an organization. This means that a user rights review will reveal whether user accounts have been assigned according to their ‘new’ job descriptions , or if there are privilege creep culprits after transfers has occurred. 


Q95. Which of the following devices would be the MOST efficient way to filter external websites for staff on an internal network? 

A. Protocol analyzer 

B. Switch 

C. Proxy 

D. Router 

Answer:

Explanation: 


Improve SY0-401 braindumps:

Q96. A company’s legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO). 

A. IPv6 

B. SFTP 

C. IPSec 

D. SSH 

E. IPv4 

Answer: A,C 

Explanation: 

Telnet supports IPv6 connections. IPv6 is the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPsec is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec is a compulsory component for IPv6. 

IPsec operates at Layer 3 of the OSI model, whereas Telnet operates at Layer 7. 


Q97. A technician is unable to manage a remote server. Which of the following ports should be opened on the firewall for remote server management? (Select TWO). 

A. 22 

B. 135 

C. 137 

D. 143 

E. 443 

F. 3389 

Answer: A,F 

Explanation: 

A secure remote administration solution and Remote Desktop protocol is required. 

Secure Shell (SSH) is a secure remote administration solution and makes use of TCP port 22. 

Remote Desktop Protocol (RDP) uses TCP port 3389. 


Q98. A system administrator is notified by a staff member that their laptop has been lost. The laptop contains the user’s digital certificate. Which of the following will help resolve the issue? (Select TWO). 

A. Revoke the digital certificate 

B. Mark the key as private and import it 

C. Restore the certificate using a CRL 

D. Issue a new digital certificate 

E. Restore the certificate using a recovery agent 

Answer: A,D 

Explanation: 

The user's certificate must be revoked to ensure that the stolen computer cannot access 

resources the user has had access to. 

To grant the user access to the resources he must be issued a new certificate. 


Q99. Layer 7 devices used to prevent specific types of html tags are called: 

A. Firewalls 

B. Content filters 

C. Routers 

D. NIDS 

Answer:

Explanation: 

A content filter is a is a type of software designed to restrict or control the content a reader is authorised to access, particularly when used to limit material delivered over the Internet via the Web, e-mail, or other means. Because the user and the OSI layer interact directly with the content filter, it operates at Layer 7 of the OSI model. 


Q100. A security administrator looking through IDS logs notices the following entry: (where email=joe@joe.com and passwd= ‘or 1==1’) 

Which of the following attacks had the administrator discovered? 

A. SQL injection 

B. XML injection 

C. Cross-site script 

D. Header manipulation 

Answer:

Explanation: 

The code in the question is an example of a SQL Injection attack. The code ‘1==1’ will always provide a value of true. This can be included in statement designed to return all rows in a SQL table. 

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.