★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Your CompTIA SY0-401 examination dilemma loan provider is actually supplied and also preserved by way of the test-commission company of by itself that shows the level typical and also strategy for examination. The start of each test its essential to remedy such as "your earnings,Inches "the dynamics of the work,Inches "Who you make payment for test certification" as well as other challenges starting a formal testing. These types of queries do not have anything regarding the particular testing, just simply profit the It all organizations understand more concerning the people shape of candidates, hence provide the sound replies will be for you to do. On the other hand, that queries in addition have a time limit. And in the type of a number of alternative brings about such as official testing queries, and frequently makes the whole candidates having the particular CompTIA test at last fully for burning.

2021 Aug security plus sy0-401 study guide:

Q771. ON NO: 161 

If you don’t know the MAC address of a Linux-based machine, what command-line utility can you use to ascertain it? 

A. macconfig 

B. ifconfig 

C. ipconfig 

D. config 

Answer: B 

Explanation: 

To find MAC address of a Unix/Linux workstation, use ifconfig or ip a. 


Q772. A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO’s requirements? 

A. Username and password 

B. Retina scan and fingerprint scan 

C. USB token and PIN 

D. Proximity badge and token 

Answer: C 

Explanation: 

Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories: knowledge factors ("things only the user knows"), such as passwords possession factors ("things only the user has"), such as ATM cards inherence factors ("things only the user is"), such as biometrics 

In this question, a USB token is a possession factor (something the user has) and a PIN is a knowledge factor (something the user knows). 


Q773. Which of the following is the MOST likely cause of users being unable to verify a single user’s email signature and that user being unable to decrypt sent messages? 

A. Unmatched key pairs 

B. Corrupt key escrow 

C. Weak public key 

D. Weak private key 

Answer: A 

Explanation: 

In a PKI the sender encrypts the data using the receiver's public key. The receiver decrypts the data using his own private key. The sender and receiver must have a matching key in order for the receiver to decrypt the data. 


Q774. Which of the following cryptographic algorithms is MOST often used with IPSec? 

A. Blowfish 

B. Twofish 

C. RC4 

D. HMAC 

Answer: D 

Explanation: 

The HMAC-MD5-96 (also known as HMAC-MD5) encryption technique is used by IPSec to make sure that a message has not been altered. 


Q775. Which of the following allows lower level domains to access resources in a separate Public Key Infrastructure? 

A. Trust Model 

B. Recovery Agent 

C. Public Key 

D. Private Key 

Answer: A 

Explanation: 

In a bridge trust model allows lower level domains to access resources in a separate PKI through the root CA. A trust Model is collection of rules that informs application on how to decide the legitimacy of a 

Digital Certificate. 

In a bridge trust model, a peer-to-peer relationship exists among the root CAs. The root CAs can 

communicate with one another, allowing cross certification. This arrangement allows a certification 

process to be established between organizations or departments. 

Each intermediate CA trusts only the CAs above and below it, but the CA structure can be 

expanded without creating additional layers of CAs. 


SY0-401 brain dumps

Abreast of the times sy0-401 study guide pdf:

Q776. Which of the following attacks could be used to initiate a subsequent man-in-the-middle attack? 

A. ARP poisoning 

B. DoS 

C. Replay 

D. Brute force 

Answer: C 

Explanation: 

A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet substitution (such as stream cipher attack). 

For example: Suppose Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping on the conversation and keeps the password (or the hash). After the interchange is over, Eve (posing as Alice) connects to Bob; when asked for a proof of identity, Eve sends Alice's password (or hash) read from the last session, which Bob accepts thus granting access to Eve. 

Countermeasures: A way to avoid replay attacks is by using session tokens: Bob sends a one-time token to Alice, which Alice uses to transform the password and send the result to Bob (e.g. computing a hash function of the session token appended to the password). On his side Bob performs the same computation; if and only if both values match, the login is successful. Now suppose Eve has captured this value and tries to use it on another session; Bob sends a different session token, and when Eve replies with the captured value it will be different from Bob's computation. Session tokens should be chosen by a (pseudo-) random process. Otherwise Eve may be able to pose as Bob, presenting some predicted future token, and convince Alice to use that token in her transformation. Eve can then replay her reply at a later time (when the previously predicted token is actually presented by Bob), and Bob will accept the authentication. One-time passwords are similar to session tokens in that the password expires after it has been used or after a very short amount of time. They can be used to authenticate individual transactions in addition to sessions. The technique has been widely implemented in personal online banking systems. Bob can also send nonces but should then include a message authentication code (MAC), which Alice should check. Timestamping is another way of preventing a replay attack. Synchronization should be achieved using a secure protocol. For example Bob periodically broadcasts the time on his clock together with a MAC. When Alice wants to send Bob a message, she includes her best estimate of the time on his clock in her message, which is also authenticated. Bob only accepts messages for which the timestamp is within a reasonable tolerance. The advantage of this scheme is that Bob does not need to generate (pseudo-) random numbers, with the trade-off being that replay attacks, if they are performed quickly enough i.e. within that 'reasonable' limit, could succeed. 


Q777. Matt, the Chief Information Security Officer (CISO), tells the network administrator that a security company has been hired to perform a penetration test against his network. The security company asks Matt which type of testing would be most beneficial for him. Which of the following BEST describes what the security company might do during a black box test? 

A. The security company is provided with all network ranges, security devices in place, and logical maps of the network. 

B. The security company is provided with no information about the corporate network or physical locations. 

C. The security company is provided with limited information on the network, including all network diagrams. 

D. The security company is provided with limited information on the network, including some subnet ranges and logical network diagrams. 

Answer: B 

Explanation: 

The term black box testing is generally associated with application testing. However, in this question the term is used for network testing. Black box testing means testing something when you have no knowledge of the inner workings. 

Black-box testing is a method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied to virtually every level of software testing: unit, integration, system and acceptance. It typically comprises most if not all higher level testing, but can also dominate unit testing as well. Specific knowledge of the application's code/internal structure and programming knowledge in general is not required. The tester is aware of what the software is supposed to do but is not aware of how it does it. For instance, the tester is aware that a particular input returns a certain, invariable output but is not aware of how the software produces the output in the first place. 


Q778. Which of the following is a directional antenna that can be used in point-to-point or point-to-multi-point WiFi communication systems? (Select TWO). 

A. Backfire 

B. Dipole 

C. Omni 

D. PTZ 

E. Dish 

Answer: A,E 

Explanation: 


Q779. The IT department noticed that there was a significant decrease in network performance during the afternoon hours. The IT department performed analysis of the network and discovered this was due to users accessing and downloading music and video streaming from social sites. The IT department notified corporate of their findings and a memo was sent to all employees addressing the misuse of company resources and requesting adherence to company policy. Which of the following policies is being enforced? 

A. Acceptable use policy 

B. Telecommuting policy 

C. Data ownership policy 

D. Non disclosure policy 

Answer: A 

Explanation: 


Q780. When Ann an employee returns to work and logs into her workstation she notices that, several desktop configuration settings have changed. Upon a review of the CCTV logs, it is determined that someone logged into Ann’s workstation. Which of the following could have prevented this from happening? 

A. Password complexity policy 

B. User access reviews 

C. Shared account prohibition policy 

D. User assigned permissions policy 

Answer: A 

Explanation: 

The most important countermeasure against password crackers is to use long, complex passwords, which are changed regularly. Since changes were made to Ann’s desktop configuration settings while she was not at work, means that her password was compromised.