Examples of comptia security+ study guide sy0 401

Proper study guides for Latest CompTIA CompTIA Security+ Certification certified begins with CompTIA comptia sy0 401 preparation products which designed to deliver the Certified comptia sy0 401 questions by making you pass the comptia security+ study guide sy0 401 test at your first time. Try the free sy0 401 pdf demo right now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q571. Separation of duties is often implemented between developers and administrators in order to separate which of the following? 

A. More experienced employees from less experienced employees 

B. Changes to program code and the ability to deploy to production 

C. Upper level management users from standard development employees 

D. The network access layer from the application access layer 

Answer:

Explanation: 

Separation of duties means that there is differentiation between users, employees and duties per se which form part of best practices. 


Q572. Encryption used by RADIUS is BEST described as: 

A. Quantum 

B. Elliptical curve 

C. Asymmetric 

D. Symmetric 

Answer:

Explanation: 

The RADIUS server uses a symmetric encryption method. 

Note: Symmetric algorithms require both ends of an encrypted message to have the same key and 

processing algorithms. Symmetric algorithms generate a secret key that must be protected. 


Q573. Which of the following is true about the CRL? 

A. It should be kept public 

B. It signs other keys 

C. It must be kept secret 

D. It must be encrypted 

Answer:

Explanation: 

The CRL must be public so that it can be known which keys and certificates have been revoked. In the operation of some cryptosystems, usually public key infrastructures (PKIs), a certificate revocation list (CRL) is a list of certificates (or more specifically, a list of serial numbers for certificates) that have been revoked, and therefore, entities presenting those (revoked) certificates should no longer be trusted. 


Q574. The datacenter manager is reviewing a problem with a humidity factor that is too low. Which of the following environmental problems may occur? 

A. EMI emanations 

B. Static electricity 

C. Condensation 

D. Dry-pipe fire suppression 

Answer:

Explanation: 

Humidity control prevents the buildup of static electricity in the environment. If the humidity drops much below 50 percent, electronic components are extremely vulnerable to damage from electrostatic shock. 


Q575. Which of the following would a security administrator implement in order to identify a problem between two systems that are not communicating properly? 

A. Protocol analyzer 

B. Baseline report 

C. Risk assessment 

D. Vulnerability scan 

Answer:

Explanation: 

A Protocol Analyzer is a hardware device or more commonly a software program used to capture 

network data communications sent between devices on a network. Capturing and analyzing the 

packets sent from two systems that are not communicating properly could help determine the 

cause of the issue. 

Well known software protocol analyzers include Message Analyzer (formerly Network Monitor) 

from Microsoft and Wireshark (formerly Ethereal). 


Q576. When performing the daily review of the system vulnerability scans of the network Joe, the administrator, noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe researches the assigned vulnerability identification number from the vendor website. Joe proceeds with applying the recommended solution for identified vulnerability. Which of the following is the type of vulnerability described? 

A. Network based 

B. IDS 

C. Signature based 

D. Host based 

Answer:

Explanation: 


Q577. While securing a network it is decided to allow active FTP connections into the network. Which of the following ports MUST be configured to allow active FTP connections? (Select TWO). 

A. 20 

B. 21 

C. 22 

D. 68 

E. 69 

Answer: A,B 

Explanation: 


Q578. Protecting the confidentiality of a message is accomplished by encrypting the message with which of the following? 

A. Sender's private key 

B. Recipient's public key 

C. Sender's public key 

D. Recipient's private key 

Answer:

Explanation: 


Q579. A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access? 

A. SCP 

B. SSH 

C. SFTP 

D. HTTPS 

Answer:

Explanation: 

Secure Shell (SSH) is a tunneling protocol originally used on Unix systems. It’s now available for both Unix and Windows environments. SSH is primarily intended for interactive terminal sessions. SSH is used to establish a command-line, text-only interface connection with a server, router, switch, or similar device over any distance. 


Q580. Ann, the software security engineer, works for a major software vendor. Which of the following practices should be implemented to help prevent race conditions, buffer overflows, and other similar vulnerabilities prior to each production release? 

A. Product baseline report 

B. Input validation 

C. Patch regression testing 

D. Code review 

Answer:

Explanation: 

The problems listed in this question can be caused by problems with the application code. Reviewing the code will help to prevent the problems. The purpose of code review is to look at all custom written code for holes that may exist. The review needs also to examine changes that the code—most likely in the form of a finished application—may make: configuration files, libraries, and the like. During this examination, look for threats such as opportunities for injection to occur (SQL, LDAP, code, and so on), cross-site request forgery, and authentication. Code review is often conducted as a part of gray box testing. Looking at source code can often be one of the easiest ways to find weaknesses within the application. Simply reading the code is known as manual assessment, whereas using tools to scan the code is known as automated assessment.