★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


2021 Apr SY0-401 free practice test

Q341. A computer supply company is located in a building with three wireless networks. The system security team implemented a quarterly security scan and saw the following. 

SSIDStateChannelLevel 

Computer AreUs1connected170dbm 

Computer AreUs2connected580dbm 

Computer AreUs3connected375dbm 

Computer AreUs4connected695dbm 

Which of the following is this an example of? 

A. Rogue access point 

B. Near field communication 

C. Jamming 

D. Packet sniffing 

Answer:

Explanation: 

The question states that the building has three wireless networks. However, the scan is showing four wireless networks with the SSIDs: Computer AreUs1 , Computer AreUs2 , Computer AreUs3 and Computer AreUs4. Therefore, one of these wireless networks probably shouldn’t be there. This is an example of a rogue access point. A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security threat to large organizations with many employees, because anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network to unauthorized parties. Rogue access points of the second kind target networks that do not employ mutual authentication (client-server server-client) and may be used in conjunction with a rogue RADIUS server, depending on security configuration of the target network. To prevent the installation of rogue access points, organizations can install wireless intrusion prevention systems to monitor the radio spectrum for unauthorized access points. 


Q342. Which of the following ports is used to securely transfer files between remote UNIX systems? 

A. 21 

B. 22 

C. 69 

D. 445 

Answer:

Explanation: 

SCP copies files securely between hosts on a network. It uses SSH for data transfer, and uses the 

same authentication and provides the same security as SSH. Unlike RCP, SCP will ask for 

passwords or passphrases if they are needed for authentication. 

SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, 

and slogin, also use TCP port 22. 


Q343. After a security incident involving a physical asset, which of the following should be done at the beginning? 

A. Record every person who was in possession of assets, continuing post-incident. 

B. Create working images of data in the following order: hard drive then RAM. 

C. Back up storage devices so work can be performed on the devices immediately. 

D. Write a report detailing the incident and mitigation suggestions. 

Answer:

Explanation: 

Asset tracking is the process of maintaining oversight over inventory, and ensuring that a device is still in the possession of the assigned authorized user. 


Q344. A security administrator is responsible for performing periodic reviews of user permission settings due to high turnover and internal transfers at a corporation. Which of the following BEST describes the procedure and security rationale for performing such reviews? 

A. Review all user permissions and group memberships to ensure only the minimum set of permissions required to perform a job is assigned. 

B. Review the permissions of all transferred users to ensure new permissions are granted so the employee can work effectively. 

C. Ensure all users have adequate permissions and appropriate group memberships, so the volume of help desk calls is reduced. 

D. Ensure former employee accounts have no permissions so that they cannot access any network file stores and resources. 

Answer:

Explanation: 

Reviewing user permissions and group memberships form part of a privilege audit is used to determine that all groups, users, and other accounts have the appropriate privileges assigned according to the policies of the corporation. 


Q345. A software firm posts patches and updates to a publicly accessible FTP site. The software firm also posts digitally signed checksums of all patches and updates. The firm does this to address: 

A. Integrity of downloaded software. 

B. Availability of the FTP site. 

C. Confidentiality of downloaded software. 

D. Integrity of the server logs. 

Answer:

Explanation: 

Digital Signatures is used to validate the integrity of the message and the sender. In this case the software firm that posted the patches and updates digitally signed the checksums of all patches and updates. 


Q346. The security team would like to gather intelligence about the types of attacks being launched against the organization. Which of the following would provide them with the MOST information? 

A. Implement a honeynet 

B. Perform a penetration test 

C. Examine firewall logs 

D. Deploy an IDS 

Answer:

Explanation: 

A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. The Honeynet Project, a non-profit research organization dedicated to computer security and information sharing, actively promotes the deployment of honeynets. In addition to the honey pots, a honeynet usually has real applications and services so that it seems like a normal network and a worthwhile target. However, because the honeynet doesn't actually serve any authorized users, any attempt to contact the network from without is likely an illicit attempt to breach its security, and any outbound activity is likely evidence that a system has been compromised. For this reason, the suspect information is much more apparent than it would be in an actual network, where it would have to be found amidst all the legitimate network data. Applications within a honeynet are often given names such as "Finances" or "Human Services" to make them sound appealing to the attacker. 

A virtual honeynet is one that, while appearing to be an entire network, resides on a single server. 


Q347. Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed? 

A. Bollards 

B. Video surveillance 

C. Proximity readers 

D. Fencing 

Answer:

Explanation: 

Video surveillance is making use of a camera, or CCTV that is able to record everything it sees and is always running. This way you will be able to check exactly who enters secure areas. 


Q348. An administrator is instructed to disable IP-directed broadcasts on all routers in an organization. Which of the following attacks does this prevent? 

A. Pharming 

B. Smurf 

C. Replay 

D. Xmas 

Answer:

Explanation: 


Q349. An IT auditor tests an application as an authenticated user. This is an example of which of the following types of testing? 

A. Penetration 

B. White box 

C. Black box 

D. Gray box 

Answer:

Explanation: 

In this question, the tester is testing the application as an authenticated user. We can assume from this that the tester has at least limited knowledge of the application. This meets the criteria of a grey-box test. Gray box testing, also called gray box analysis, is a strategy for software debugging in which the tester has limited knowledge of the internal details of the program. A gray box is a device, program or system whose workings are partially understood. Gray box testing can be contrasted with black box testing, a scenario in which the tester has no knowledge or access to the internal workings of a program, or white box testing, a scenario in which the internal particulars are fully known. Gray box testing is commonly used in penetration tests. Gray box testing is considered to be non-intrusive and unbiased because it does not require that the tester have access to the source code. With respect to internal processes, gray box testing treats a program as a black box that must be analyzed from the outside. During a gray box test, the person may know how the system components interact but not have detailed knowledge about internal program functions and operation. A clear distinction exists between the developer and the tester, thereby minimizing the risk of personnel conflicts. 


Q350. Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives? 

A. Degaussing 

B. Physical Destruction 

C. Lock up hard drives in a secure safe 

D. Wipe 

Answer:

Explanation: 

The physical description of hard drives is the only secure means of disposing hard drives. This can include incineration, an acid bath, and crushing.