★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


CompTIA CompTIA exam dumps are continuously revised and stored up-to-date. We pay attention towards the progress of SY0-401 goods customers, gather feedback via them. Free CompTIA SY0-401 updates to get a year after your obtain. Printable and portable version associated with CompTIA SY0-401 certification exam questions and answers.

2021 Nov comptia security+ review guide exam sy0-401 pdf:

Q461. Which of the following uses both a public and private key? 

A. RSA 

B. AES 

C. MD5 

D. SHA 

Answer:

Explanation: 

The RSA algorithm is an early public-key encryption system that uses large integers as the basis 

for the process. 

RSA uses both a public key and a secret. 

RSA key generation process: 

1.

 Generate two large random primes, p and q, of approximately equal size such that their product, n = pq, is of the required bit length (such as 2048 bits, 4096 bits, and so forth). Let n = pq Let m = (p-1)(q-1) 

2.

 Choose a small number e, co-prime to m (note: Two numbers are co-prime if they have no common factors). 

3.

 Find d, such that de % m = 1 

4.

 Publish e and n as the public key. Keep d and n as the secret key. 


Q462. The Quality Assurance team is testing a new third party developed application. The Quality team does not have any experience with the application. Which of the following is the team performing? 

A. Grey box testing 

B. Black box testing 

C. Penetration testing 

D. White box testing 

Answer:

Explanation: 

Black-box testing is a method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied to virtually every level of software testing: unit, integration, system and acceptance. It typically comprises most if not all higher level testing, but can also dominate unit testing as well. Specific knowledge of the application's code/internal structure and programming knowledge in general is not required. The tester is aware of what the software is supposed to do but is not aware of how it does it. For instance, the tester is aware that a particular input returns a certain, invariable output but is not aware of how the software produces the output in the first place. 


Q463. Which of the following is a programming interface that allows a remote computer to run programs on a local machine? 

A. RPC 

B. RSH 

C. SSH 

D. SSL 

Answer:

Explanation: 

Remote Procedure Call (RPC) is a programming interface that allows a remote computer to run programs on a local machine. 


Q464. Which of the following assets is MOST likely considered for DLP? 

A. Application server content 

B. USB mass storage devices 

C. Reverse proxy 

D. Print server 

Answer:

Explanation: 

Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data. A USB presents the most likely device to be used to steal data because of its physical size. 


Q465. Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table? 

A. Full disk 

B. Individual files 

C. Database 

D. Removable media 

Answer:

Explanation: 

A table is stored in a database. Database encryption makes use of cryptography functions that are built into the database software to encrypt the data stored in the database. This often offers granular encryption options which allows for the encryptions of the entire database, specific database tables, or specific database fields, such as a credit card number field. 


Most recent passed sy0-401:

Q466. The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security posture. Which of the following security techniques is MOST appropriate to do this? 

A. Log audits 

B. System hardening 

C. Use IPS/IDS 

D. Continuous security monitoring 

Answer:

Explanation: 

A security baseline is the security setting of a system that is known to be secure. This is the initial security setting of a system. Once the baseline has been applied, it must be maintained or improved. Maintaining the security baseline requires continuous monitoring. 


Q467. DRAG DROP 

A security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. Drag and drop the applicable controls to each asset type. 

Instructions: Controls can be used multiple times and not all placeholders need to be filled. When you have completed the simulation, please select the Done button to submit. 

Answer: 

Explanation: 

References: 

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, 

Indianapolis, 2014, pp 221, 222, 369, 418 

http://www.mentor-app.com/ 


Q468. Encryption used by RADIUS is BEST described as: 

A. Quantum 

B. Elliptical curve 

C. Asymmetric 

D. Symmetric 

Answer:

Explanation: 

The RADIUS server uses a symmetric encryption method. 

Note: Symmetric algorithms require both ends of an encrypted message to have the same key and 

processing algorithms. Symmetric algorithms generate a secret key that must be protected. 


Q469. Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network? 

A. Security logs 

B. Protocol analyzer 

C. Audit logs 

D. Honeypot 

Answer:

Explanation: 

A honeypot is a system whose purpose it is to be attacked. An administrator can watch and study 

the attack to research current attack methodologies. 

According to the Wepopedia.com, a Honeypot luring a hacker into a system has several main 

purposes: 

The administrator can watch the hacker exploit the vulnerabilities of the system, thereby learning 

where the system has weaknesses that need to be redesigned. 

The hacker can be caught and stopped while trying to obtain root access to the system. 

By studying the activities of hackers, designers can better create more secure systems that are 

potentially invulnerable to future hackers. 

There are two main types of honeypots: 

Production - A production honeypot is one used within an organization's environment to help 

mitigate risk. 

Research – A research honeypot add value to research in computer security by providing a platform to study the threat. 


Q470. Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network? 

A. HIPS on each virtual machine 

B. NIPS on the network 

C. NIDS on the network 

D. HIDS on each virtual machine 

Answer:

Explanation: 

Host-based intrusion prevention system (HIPS) is an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host.