★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Exam Code: SY0-401 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Security+ Certification
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass SY0-401 Exam.

2021 Jun sy0-401 voucher:

Q21. A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server’s drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO? (Select TWO). 

A. Disk hashing procedures 

B. Full disk encryption 

C. Data retention policies 

D. Disk wiping procedures 

E. Removable media encryption 

Answer: B,D 

Explanation: 

B: Full disk encryption is when the entire volume is encrypted; the data is not accessible to someone who might boot another operating system in an attempt to bypass the computer’s security. Full disk encryption is sometimes referred to as hard drive encryption. 

D: Disk wiping is the process of overwriting data on the repeatedly, or using a magnet to alter the magnetic structure of the disks. This renders the data unreadable. 


Q22. Matt, a systems security engineer, is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credential type authentication method BEST fits these requirements? 

A. EAP-TLS 

B. EAP-FAST 

C. PEAP-CHAP 

D. PEAP-MSCHAPv2 

Answer: D 

Explanation: 

PEAP-MS-CHAP v2 is easier to deploy than EAP-TLS or PEAP-TLS because user authentication is accomplished via password-base credentials (user name and password) rather than digital certificates or smart cards. Only servers running Network Policy Server (NPS) or PEAP-MS-CHAP v2 are required to have a certificate. 


Q23. A security administrator notices large amounts of traffic within the network heading out to an external website. The website seems to be a fake bank site with a phone number that when called, asks for sensitive information. After further investigation, the security administrator notices that a fake link was sent to several users. This is an example of which of the following attacks? 

A. Vishing 

B. Phishing 

C. Whaling 

D. SPAM 

E. SPIM 

Answer: B 

Explanation: 

Phishing is the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Phishing email will direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and set up only to steal the information the user enters on the page. Phishing emails are blindly sent to thousands, if not millions of recipients. By spamming large groups of people, the "phisher" counts on the email being read by a percentage of people who actually have an account with the legitimate company being spoofed in the email and corresponding webpage. Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting. 


Q24. A network technician is on the phone with the system administration team. Power to the server room was lost and servers need to be restarted. The DNS services must be the first to be restarted. Several machines are powered off. Assuming each server only provides one service, which of the following should be powered on FIRST to establish DNS services? 

A. Bind server 

B. Apache server 

C. Exchange server 

D. RADIUS server 

Answer: A 

Explanation: 

BIND (Berkeley Internet Name Domain) is the most widely used Domain Name System (DNS) software on the Internet. It includes the DNS server component contracted for name daemon. This is the only option that directly involves DNS. 


Q25. By default, which of the following uses TCP port 22? (Select THREE). 

A. FTPS 

B. STELNET 

C. TLS 

D. SCP 

E. SSL 

F. HTTPS 

G. SSH 

H. SFTP 

Answer: D,G,H 

Explanation: 

G: Secure Shell (SSH) is a cryptographic network protocol for securing data communication. It establishes a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login, remote command execution, but any network service can be secured with SSH. SSH uses port 22. 

D: SCP stands for Secure Copy. SCP is used to securely copy files over a network. SCP uses SSH to secure the connection and therefore uses port 22. 

H: SFTP stands for stands for Secure File Transfer Protocol and is used for transferring files using FTP over a secure network connection. SFTP uses SSH to secure the connection and therefore uses port 22. 


SY0-401 test questions

Up to the immediate present sy0-301 or sy0-401:

Q26. Mandatory vacations are a security control which can be used to uncover which of the following? 

A. Fraud committed by a system administrator 

B. Poor password security among users 

C. The need for additional security staff 

D. Software vulnerabilities in vendor code 

Answer: A 

Explanation: 

Mandatory vacations also provide an opportunity to discover fraud apart from the obvious benefits of giving employees a chance to refresh and making sure that others in the company can fill those positions and make the company less dependent on those persons; a sort pf replication and duplication at all levels. 


Q27. Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk? 

A. Incident management 

B. Clean desk policy 

C. Routine audits 

D. Change management 

Answer: D 

Explanation: 

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. This structured approach involves policies that should be in place and technological controls that should be enforced. 


Q28. An administrator needs to renew a certificate for a web server. Which of the following should be submitted to a CA? 

A. CSR 

B. Recovery agent 

C. Private key 

D. CRL 

Answer: A 

Explanation: 

In public key infrastructure (PKI) systems, a certificate signing request (also CSR or certification 

request) is a message sent from an applicant to a certificate authority in order to apply for a digital 

identity certificate. 

When you renew a certificate you send a CSR to the CA to get the certificate resigned. 


Q29. The incident response team has received the following email message. 

From: monitor@ext-company.com To: security@company.com Subject: Copyright infringement 

A copyright infringement alert was triggered by IP address 13.10.66.5 at 09: 50: 01 GMT. 

After reviewing the following web logs for IP 13.10.66.5, the team is unable to correlate and identify the incident. 

09:

 45: 33 13.10.66.5 http: //remote.site.com/login.asp?user=john 

09:

 50: 22 13.10.66.5 http: //remote.site.com/logout.asp?user=anne 

10: 50: 01 13.10.66.5 http: //remote.site.com/access.asp?file=movie.mov 

11: 02: 45 13.10.65.5 http: //remote.site.com/download.asp?movie.mov=ok 

Which of the following is the MOST likely reason why the incident response team is unable to identify and correlate the incident? 

A. The logs are corrupt and no longer forensically sound. 

B. Traffic logs for the incident are unavailable. 

C. Chain of custody was not properly maintained. 

D. Incident time offsets were not accounted for. 

Answer: D 

Explanation: 

It is quite common for workstation times to be off slightly from actual time, and that can happen with servers as well. Since a forensic investigation is usually dependent on a step-by-step account of what has happened, being able to follow events in the correct time sequence is critical. Because of this, it is imperative to record the time offset on each affected machine during the investigation. One method of assisting with this is to add an entry to a log file and note the time that this was done and the time associated with it on the system. 


Q30. An administrator needs to secure RADIUS traffic between two servers. Which of the following is the BEST solution? 

A. Require IPSec with AH between the servers 

B. Require the message-authenticator attribute for each message 

C. Use MSCHAPv2 with MPPE instead of PAP 

D. Require a long and complex shared secret for the servers 

Answer: A 

Explanation: