Advanced Guide: comptia sy0 401


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q371. Which of the following provides the strongest authentication security on a wireless network? 

A. MAC filter 

B. WPA2 

C. WEP 

D. Disable SSID broadcast 

Answer:

Explanation: 

The Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) authentication protocols were designed to address the core, easy-to-crack problems of WEP. 


Q372. DRAG DROP 

Drag and drop the correct protocol to its default port. 

Answer: 

Explanation: 

FTP uses TCP port 21. 

Telnet uses port 23. 

SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, 

and slogin, also use TCP port 22. Secure Copy Protocol (SCP) is a secure file-transfer facility 

based on SSH and Remote Copy Protocol (RCP). Secure FTP (SFTP) is a secured alternative to 

standard File Transfer Protocol (FTP). 

SMTP uses TCP port 25. 

Port 69 is used by TFTP. 

SNMP makes use of UDP ports 161 and 162. 

References: 

Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp 42, 45, 

http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers 


Q373. In order to securely communicate using PGP, the sender of an email must do which of the following when sending an email to a recipient for the first time? 

A. Import the recipient’s public key 

B. Import the recipient’s private key 

C. Export the sender’s private key 

D. Export the sender’s public key 

Answer:

Explanation: 

See step 4 below. 

1.

 When a user encrypts plaintext with PGP, PGP first compresses the plaintext. 

2.

 PGP then creates a session key, which is a one-time-only secret key. 

3.

 This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext. 

4.

 Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient. 


Q374. Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process? 

A. Separation of Duties 

B. Mandatory Vacations 

C. Discretionary Access Control 

D. Job Rotation 

Answer:

Explanation: 

Separation of duties means that users are granted only the permissions they need to do their work and no more. 


Q375. A security technician wishes to gather and analyze all Web traffic during a particular time period. 

Which of the following represents the BEST approach to gathering the required data? 

A. Configure a VPN concentrator to log all traffic destined for ports 80 and 443. 

B. Configure a proxy server to log all traffic destined for ports 80 and 443. 

C. Configure a switch to log all traffic destined for ports 80 and 443. 

D. Configure a NIDS to log all traffic destined for ports 80 and 443. 

Answer:

Explanation: 

A proxy server is in essence a device that acts on behalf of others and in security terms all internal user interaction with the Internet should be controlled through a proxy server. This makes a proxy server the best tool to gather the required data. 


Q376. Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware? 

A. Logic bomb 

B. Worm 

C. Trojan 

D. Adware 

Answer:

Explanation: 

In computers, a Trojan is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. 


Q377. Which of the following is best practice to put at the end of an ACL? 

A. Implicit deny 

B. Time of day restrictions 

C. Implicit allow 

D. SNMP string 

Answer:

Explanation: 

An implicit deny clause is implied at the end of each ACL. This implies that if you aren’t specifically granted access or privileges for a resource, you’re denied access by default. The implicit deny clause is set by the system. 


Q378. Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described? 

A. Phishing 

B. Tailgating 

C. Pharming 

D. Vishing 

Answer:

Explanation: 

Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities. Vishing works like phishing but does not always occur over the Internet and is carried out using voice technology. A vishing attack can be conducted by voice email, VoIP (voice over IP), or landline or cellular telephone. The potential victim receives a message, often generated by speech synthesis, indicating that suspicious activity has taken place in a credit card account, bank account, mortgage account or other financial service in their name. The victim is told to call a specific telephone number and provide information to "verify identity" or to "ensure that fraud does not occur." If the attack is carried out by telephone, caller ID spoofing can cause the victim's set to indicate a legitimate source, such as a bank or a government agency. 

Vishing is difficult for authorities to trace, particularly when conducted using VoIP. Furthermore, like many legitimate customer services, vishing scams are often outsourced to other countries, which may render sovereign law enforcement powerless. 

Consumers can protect themselves by suspecting any unsolicited message that suggests they are targets of illegal activity, no matter what the medium or apparent source. Rather than calling a number given in any unsolicited message, a consumer should directly call the institution named, using a number that is known to be valid, to verify all recent activity and to ensure that the account information has not been tampered with. 


Q379. A security administrator is reviewing the below output from a password auditing tool: 

P@ss. 

@pW1. 

S3cU4 

Which of the following additional policies should be implemented based on the tool’s output? 

A. Password age 

B. Password history 

C. Password length 

D. Password complexity 

Answer:

Explanation: 

The output shows that all the passwords are either 4 or 5 characters long. This is way too short, 8 characters are shown to be the minimum for password length. 


Q380. A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability. 

Which of the following BEST describes this exploit? 

A. Malicious insider threat 

B. Zero-day 

C. Client-side attack 

D. Malicious add-on 

Answer:

Explanation: 

A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. In this question, there are no patches are available to mitigate the vulnerability. This is therefore a zero-day vulnerability.