Foolproof sy0 401 practice exam tips


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q221. Which of the following authentication services should be replaced with a more secure alternative? 

A. RADIUS 

B. TACACS 

C. TACACS+ 

D. XTACACS 

Answer:

Explanation: 

Terminal Access Controller Access-Control System (TACACS) is less secure than XTACACS, which is a proprietary extension of TACACS, and less secure than TACACS+, which replaced TACACS and XTACACS. 


Q222. Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her office without supplying a username/password combination. Upon disconnecting from the wireless network, she attempted to connect her personal tablet computer to the same wireless network and could not connect. 

Which of the following is MOST likely the reason? 

A. The company wireless is using a MAC filter. 

B. The company wireless has SSID broadcast disabled. 

C. The company wireless is using WEP. 

D. The company wireless is using WPA2. 

Answer:

Explanation: 

MAC filtering allows you to include or exclude computers and devices based on their MAC address. 


Q223. Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to the building. Sara then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the following attacks occurred LAST? 

A. Phishing 

B. Shoulder surfing 

C. Impersonation 

D. Tailgating 

Answer:

Explanation: 

Two attacks took place in this question. The first attack was shoulder surfing. This was the act of Sara recording a person typing in their ID number into a keypad to gain access to the building. The second attack was impersonation. Sara called the helpdesk and used the PIN to impersonate the person she recorded. 


Q224. Which of the following security awareness training is BEST suited for data owners who are concerned with protecting the confidentiality of their data? 

A. Social networking use training 

B. Personally owned device policy training 

C. Tailgating awareness policy training 

D. Information classification training 

Answer:

Explanation: 

Information classification is done by confidentiality and comprises of three categories, namely: public use, internal use and restricted use. Knowing these categories and how to handle data according to its category is essential in protecting the confidentiality of the data. 


Q225. After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the document is no longer encrypted. Which of the following can a security technician implement to ensure that documents stored on Joe’s desktop remain encrypted when moved to external media or other network based storage? 

A. Whole disk encryption 

B. Removable disk encryption 

C. Database record level encryption 

D. File level encryption 

Answer:

Explanation: 

Encryption is used to ensure the confidentiality of information. In this case you should make use of file level encryption. File level encryption is a form of disk encryption where individual files or directories are encrypted by the file system itself. This is in contrast to full disk encryption where the entire partition or disk, in which the file system resides, is encrypted. 


Q226. Visitors entering a building are required to close the back door before the front door of the same entry room is open. Which of the following is being described? 

A. Tailgating 

B. Fencing 

C. Screening 

D. Mantrap 

Answer:

Explanation: 

Mantraps are designed to contain an unauthorized, potentially hostile person/individual physically until authorities arrive. Mantraps are typically manufactured with bulletproof glass, high-strength doors, and locks and to allow the minimal amount of individuals depending on its size. Some mantraps even include scales that will weigh the person. The doors are designed in such a way as to open only when the mantrap is occupied or empty and not in-between. This means that the backdoor must first close before the front door will open; exactly what is required in this scenario. 


Q227. Which of the following protocols is vulnerable to man-in-the-middle attacks by NOT using end to end TLS encryption? 

A. HTTPS 

B. WEP 

C. WPA 

D. WPA 2 

Answer:

Explanation: 

WEP offers no end-to-end TLS encryption. 

The WEP process consists of a series of steps as follows: 

The wireless client sends an authentication request. 

The Access Point (AP) sends an authentication response containing clear-text (uh-oh!) challenge 

text. 

The client takes the challenge text received and encrypts it using a static WEP key. 

The client sends the encrypted authentication packet to the AP. 

The AP encrypts the challenge text using its own static WEP key and compares the result to the 

authentication packet sent by the client. If the results match, the AP begins the association 

process for the wireless client. 

The big issue with WEP is the fact that it is very susceptible to a Man in the Middle attack. The 

attacker captures the clear-text challenge and then the authentication packet reply. The attacker 

then reverses the RC4 encryption in order to derive the static WEP key. Yikes! 

As you might guess, the designers attempted to strengthen WEP using the approach of key 

lengths. The native Windows client supported a 104-bit key as opposed to the initial 40-bit key. 

The fundamental weaknesses in the WEP process still remained however. 


Q228. After recovering from a data breach in which customer data was lost, the legal team meets with the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data. 

Which of the following controls support this goal? 

A. Contingency planning 

B. Encryption and stronger access control 

C. Hashing and non-repudiation 

D. Redundancy and fault tolerance 

Answer:

Explanation: 

Encryption is used to protect data/contents/documents. Access control refers to controlling who accesses any data/contents/documents and to exercise authorized control to the accessing of that data. 


Q229. A security analyst performs the following activities: monitors security logs, installs surveillance cameras and analyzes trend reports. Which of the following job responsibilities is the analyst performing? (Select TWO). 

A. Detect security incidents 

B. Reduce attack surface of systems 

C. Implement monitoring controls 

D. Hardening network devices 

E. Prevent unauthorized access 

Answer: A,C 

Explanation: 

By monitoring security logs, installing security cameras and analyzing trend reports, the security analyst is implementing monitoring controls. With the monitoring controls in place, by monitoring the security logs, reviewing the footage from the security cameras and analyzing trend reports, the security analyst is able to detect security incidents. 


Q230. A security administrator needs to image a large hard drive for forensic analysis. Which of the following will allow for faster imaging to a second hard drive? 

A. cp /dev/sda /dev/sdb bs=8k 

B. tail -f /dev/sda > /dev/sdb bs=8k 

C. dd in=/dev/sda out=/dev/sdb bs=4k 

D. locate /dev/sda /dev/sdb bs=4k 

Answer:

Explanation: 

dd is a command-line utility for Unix and Unix-like operating systems whose primary purpose is to convert and copy files. dd can duplicate data across files, devices, partitions and volumes On Unix, device drivers for hardware (such as hard disks) and special device files (such as /dev/zero and /dev/random) appear in the file system just like normal files; dd can also read and/or write from/to these files, provided that function is implemented in their respective driver. As a result, dd can be used for tasks such as backing up the boot sector of a hard drive, and obtaining a fixed amount of random data. The dd program can also perform conversions on the data as it is copied, including byte order swapping and conversion to and from the ASCII and EBCDIC text encodings. An attempt to copy the entire disk using cp may omit the final block if it is of an unexpected length; whereas dd may succeed. The source and destination disks should have the same size.