★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Want to know Examcollection SY0-401 Exam practice test features? Want to lear more about CompTIA CompTIA Security+ Certification certification experience? Study Refined CompTIA SY0-401 answers to Renewal SY0-401 questions at Examcollection. Gat a success with an absolute guarantee to pass CompTIA SY0-401 (CompTIA Security+ Certification) test on your first attempt.

2021 Feb actual test sy0-401:

Q481. Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation? 

A. Implement WPA 

B. Disable SSID 

C. Adjust antenna placement 

D. Implement WEP 

Answer:

Explanation: Of the options supplied, WiFi Protected Access (WPA) is the most secure and is the replacement for WEP. 


Q482. After viewing wireless traffic, an attacker notices the following networks are being broadcasted by local access points: 

Corpnet Coffeeshop 

FreePublicWifi 

Using this information the attacker spoofs a response to make nearby laptops connect back to a malicious device. Which of the following has the attacker created? 

A. Infrastructure as a Service 

B. Load balancer 

C. Evil twin 

D. Virtualized network 

Answer:

Explanation: 

In this question, the attacker has created another wireless network that is impersonating one of more of the three wireless networks listed in the question. This is known as an Evil Twin. An evil twin, in the context of network security, is a rogue or fake wireless access point (WAP) that appears as a genuine hotspot offered by a legitimate provider. In an evil twin attack, an eavesdropper or hacker fraudulently creates this rogue hotspot to collect the personal data of unsuspecting users. Sensitive data can be stolen by spying on a connection or using a phishing technique. For example, a hacker using an evil twin exploit may be positioned near an authentic Wi-Fi access point and discover the service set identifier (SSID) and frequency. The hacker may then send a radio signal using the exact same frequency and SSID. To end users, the rogue evil twin appears as their legitimate hotspot with the same name. In wireless transmissions, evil twins are not a new phenomenon. Historically, they were known as honeypots or base station clones. With the advancement of wireless technology and the use of wireless devices in public areas, it is very easy for novice users to set up evil twin exploits. 


Q483. A company has several conference rooms with wired network jacks that are used by both employees and guests. Employees need access to internal resources and guests only need access to the Internet. Which of the following combinations is BEST to meet the requirements? 

A. NAT and DMZ 

B. VPN and IPSec 

C. Switches and a firewall 

D. 802.1x and VLANs 

Answer:

Explanation: 

802.1x is a port-based authentication mechanism. It’s based on Extensible Authentication Protocol (EAP) and is commonly used in closed-environment wireless networks. 802.1x was initially used to compensate for the weaknesses of Wired Equivalent Privacy (WEP), but today it’s often used as a component in more complex authentication and connection-management systems, including Remote Authentication Dial-In User Service (RADIUS), Diameter, Cisco System’s Terminal Access Controller Access-Control System Plus (TACACS+), and Network Access Control (NAC). 

A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. By default, all ports on a switch are part of VLAN 1. But as the switch administrator changes the VLAN assignment on a port-by-port basis, various ports can be grouped together and be distinct from other VLAN port designations. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function. 


Q484. Which of the following is the MOST important step for preserving evidence during forensic procedures? 

A. Involve law enforcement 

B. Chain of custody 

C. Record the time of the incident 

D. Report within one hour of discovery 

Answer:

Explanation: 

Chain of custody deals with how evidence is secured, where it is stored, and who has access to it. 

When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. The evidence must always be within your custody, or you’re open to dispute about possible evidence tampering. Thus to preserve evidence during a forensic procedure the chain of custody is of utmost importance. 


Q485. Which of the following describes the purpose of an MOU? 

A. Define interoperability requirements 

B. Define data backup process 

C. Define onboard/offboard procedure 

D. Define responsibilities of each party 

Answer:

Explanation: 

MOU or Memorandum of Understanding is a document outlining which party is responsible for what portion of the work. 


Refresh security+ sy0-401 cheat sheet:

Q486. A company's Chief Information Officer realizes the company cannot continue to operate after a disaster. Which of the following describes the disaster? 

A. Risk 

B. Asset 

C. Threat 

D. Vulnerability 

Answer:

Explanation: 


Q487. Which of the following utilities can be used in Linux to view a list of users’ failed authentication attempts? 

A. badlog 

B. faillog 

C. wronglog 

D. killlog 

Answer:

Explanation: 

var/log/faillog - This Linux log fi le contains failed user logins. You’ll find this log useful when 

tracking attempts to crack into your system. 

/var/log/apport.log This log records application crashes. Sometimes these can reveal attempts to 

compromise the system or the presence of a virus or spyware. 


Q488. Which of the following helps to establish an accurate timeline for a network intrusion? 

A. Hashing images of compromised systems 

B. Reviewing the date of the antivirus definition files 

C. Analyzing network traffic and device logs 

D. Enforcing DLP controls at the perimeter 

Answer:

Explanation: 


Q489. A company uses PGP to ensure that sensitive email is protected. Which of the following types of cryptography is being used here for the key exchange? 

A. Symmetric 

B. Session-based 

C. Hashing 

D. Asymmetric 

Answer:

Explanation: 

PGP combines symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric encryption algorithm, which requires a symmetric key. Each symmetric key is used only once and is also called a session key. 


Q490. Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company? 

A. Privacy Policy 

B. Least Privilege 

C. Acceptable Use 

D. Mandatory Vacations 

Answer:

Explanation: 

A mandatory vacation policy requires all users to take time away from work to refresh. But not only does mandatory vacation give the employee a chance to refresh, but it also gives the company a chance to make sure that others can fill in any gaps in skills and satisfies the need to have replication or duplication at all levels as well as an opportunity to discover fraud.