★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Audit SY0-401, individuals name when CompTIA Security+ Certification. SY0-401 review is often a remarkable qualifications of IT that may be demanded through many That professionals getting high position plus active of know-how inside their related area of interest. Recognition associated with Audit SY0-401 gives clear possibilities to getting fine task plus career. By permitting CompTIA SY0-401 qualifications you possibly can elevate your truly worth plus value in front of your current businesses.

2021 Oct sy0-401 exam price:

Q671. The security administrator is observing unusual network behavior from a workstation. The workstation is communicating with a known malicious destination over an encrypted tunnel. A full antivirus scan, with an updated antivirus definition file, does not show any signs of infection. 

Which of the following has happened on the workstation? 

A. Zero-day attack 

B. Known malware infection 

C. Session hijacking 

D. Cookie stealing 

Answer: A 

Explanation: 

The vulnerability was unknown in that the full antivirus scan did not detect it. This is zero day vulnerability. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. 


Q672. Which of the following must a user implement if they want to send a secret message to a coworker by embedding it within an image? 

A. Transport encryption 

B. Steganography 

C. Hashing 

D. Digital signature 

Answer: B 

Explanation: 

Steganography is the process of concealing a file, message, image, or video within another file, message, image, or video. Note: The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable will arouse interest, and may in themselves be incriminating in countries where encryption is illegal. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. 


Q673. A company’s legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO). 

A. IPv6 

B. SFTP 

C. IPSec 

D. SSH 

E. IPv4 

Answer: A,C 

Explanation: 

Telnet supports IPv6 connections. IPv6 is the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPsec is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec is a compulsory component for IPv6. 

IPsec operates at Layer 3 of the OSI model, whereas Telnet operates at Layer 7. 


Q674. Which of the following provides a static record of all certificates that are no longer valid? 

A. Private key 

B. Recovery agent 

C. CRLs 

D. CA 

Answer: C 

Explanation: 

The CRL (Certificate revocation list) is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued them, are also included. In addition, each list contains a proposed date for the next release. When a potential user attempts to access a server, the server allows or denies access based on the CRL entry for that particular user. 


Q675. A company wants to ensure that its hot site is prepared and functioning. Which of the following would be the BEST process to verify the backup datacenter is prepared for such a scenario? 

A. Site visit to the backup data center 

B. Disaster recovery plan review 

C. Disaster recovery exercise 

D. Restore from backup 

Answer: C 

Explanation: 

A hot site is a location that can provide operations within hours of a failure. This type of site would have servers, networks, and telecommunications equipment in place to reestablish service in a short time. Hot sites provide network connectivity, systems, and preconfigured software to meet the needs of an organization. This means that an actual exercise run would test the abilities of your hot site best. 


SY0-401 download

Abreast of the times comptia security+ certification bundle second edition (exam sy0-401):

Q676. A security analyst has been notified that trade secrets are being leaked from one of the executives in the corporation. When reviewing this executive’s laptop they notice several pictures of the employee’s pets are on the hard drive and on a cloud storage network. When the analyst hashes the images on the hard drive against the hashes on the cloud network they do not match. 

Which of the following describes how the employee is leaking these secrets? 

A. Social engineering 

B. Steganography 

C. Hashing 

D. Digital signatures 

Answer: B 

Explanation: 

Steganography is the process of hiding one message in another. Steganography may also be referred to as electronic watermarking. It is also the process of hiding a message in a medium such as a digital image, audio fi le, or other fi le. In theory, doing this prevents analysts from detecting the real message. You could encode your message in another file or message and use that file to hide your message. 


Q677. Which of the following components MUST be trusted by all parties in PKI? 

A. Key escrow 

B. CA 

C. Private key 

D. Recovery key 

Answer: B 

Explanation: 

A certificate authority (CA) is an organization that is responsible for issuing, revoking, and 

distributing certificates. In a simple trust model all parties must trust the CA. 

In a more complicated trust model all parties must trust the Root CA. 


Q678. Users report that after downloading several applications, their systems’ performance has noticeably decreased. Which of the following would be used to validate programs prior to installing them? 

A. Whole disk encryption 

B. SSH 

C. Telnet 

D. MD5 

Answer: D 

Explanation: 

MD5 can be used to locate the data which has changed. 

The Message Digest Algorithm (MD) creates a hash value and uses a one-way hash. The hash 

value is used to help maintain integrity. There are several versions of MD; the most common are 

MD5, MD4, and MD2. 


Q679. A small business needs to incorporate fault tolerance into their infrastructure to increase data availability. Which of the following options would be the BEST solution at a minimal cost? 

A. Clustering 

B. Mirrored server 

C. RAID 

D. Tape backup 

Answer: C 

Explanation: 

RAID, or redundant array of independent disks (RAID). RAID allows your existing servers to have more than one hard drive so that if the main hard drive fails, the system keeps functioning. RAID can achieve fault tolerance using software which can be done using the existing hardware and software. 


Q680. The loss prevention department has purchased a new application that allows the employees to monitor the alarm systems at remote locations. However, the application fails to connect to the vendor's server and the users are unable to log in. Which of the following are the MOST likely causes of this issue? (Select TWO). 

A. URL filtering 

B. Role-based access controls 

C. MAC filtering 

D. Port Security 

E. Firewall rules 

Answer: A,E 

Explanation: