★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Q491. A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file was found on an underused server and appears to contain a zero-day exploit. Which of the following can the researcher do to determine if the file is malicious in nature? 

A. TCP/IP socket design review 

B. Executable code review 

C. OS Baseline comparison 

D. Software architecture review 

Answer:

Explanation: 

Zero-Day Exploits begin exploiting holes in any software the very day it is discovered. It is very difficult to respond to a zero-day exploit. Often, the only thing that you as a security administrator can do is to turn off the service. Although this can be a costly undertaking in terms of productivity, it is the only way to keep the network safe. In this case you want to check if the executable file is malicious. Since a baseline represents a secure state is would be possible to check the nature of the executable file in an isolated environment against the OS baseline. 


Q492. A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal? 

A. Block port 23 on the L2 switch at each remote site 

B. Block port 23 on the network firewall 

C. Block port 25 on the L2 switch at each remote site 

D. Block port 25 on the network firewall 

Answer:

Explanation: 

Telnet is a terminal-emulation network application that supports remote connectivity for executing commands and running applications but doesn’t support transfer of fi les. Telnet uses TCP port 23. Because it’s a clear text protocol and service, it should be avoided and replaced with SSH. 


Q493. An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to integrate the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal? 

A. Unified Threat Management 

B. Virtual Private Network 

C. Single sign on 

D. Role-based management 

Answer:

Explanation: 

Unified Threat Management (UTM) is, basically, the combination of a firewall with other abilities. 

These abilities include intrusion prevention, antivirus, content filtering, etc. Advantages of 

combining everything into one: 

You only have one product to learn. 

You only have to deal with a single vendor. 

IT provides reduced complexity. 


Q494. Which of the following is a common coding error in which boundary checking is not performed? 

A. Input validation 

B. Fuzzing 

C. Secure coding 

D. Cross-site scripting 

Answer:

Explanation: 

Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain. 


Q495. Based on information leaked to industry websites, business management is concerned that unauthorized employees are accessing critical project information for a major, well-known new product. To identify any such users, the security administrator could: 

A. Set up a honeypot and place false project documentation on an unsecure share. 

B. Block access to the project documentation using a firewall. 

C. Increase antivirus coverage of the project servers. 

D. Apply security updates and harden the OS on all project servers. 

Answer:

Explanation: 

In this scenario, we would use a honeypot as a ‘trap’ to catch unauthorized employees who are accessing critical project information. A honeypot is a system whose purpose it is to be attacked. An administrator can watch and study 

the attack to research current attack methodologies. 

According to the Wepopedia.com, a Honeypot luring a hacker into a system has several main 

purposes: 

The administrator can watch the hacker exploit the vulnerabilities of the system, thereby learning 

where the system has weaknesses that need to be redesigned. 

The hacker can be caught and stopped while trying to obtain root access to the system. 

By studying the activities of hackers, designers can better create more secure systems that are 

potentially invulnerable to future hackers. 

There are two main types of honeypots: 

Production - A production honeypot is one used within an organization's environment to help 

mitigate risk. 

Research – A research honeypot add value to research in computer security by providing a 

platform to study the threat. 


Q496. A security administrator needs a locally stored record to remove the certificates of a terminated employee. Which of the following describes a service that could meet these requirements? 

A. OCSP 

B. PKI 

C. CA 

D. CRL 

Answer:

Explanation: 

A CRL is a locally stored record containing revoked certificates and revoked keys. 


Q497. Which of the following is the default port for TFTP? 

A. 20 

B. 69 

C. 21 

D. 68 

Answer:

Explanation: 

TFTP makes use of UDP port 69. 


Q498. When Ann an employee returns to work and logs into her workstation she notices that, several desktop configuration settings have changed. Upon a review of the CCTV logs, it is determined that someone logged into Ann’s workstation. Which of the following could have prevented this from happening? 

A. Password complexity policy 

B. User access reviews 

C. Shared account prohibition policy 

D. User assigned permissions policy 

Answer:

Explanation: 

The most important countermeasure against password crackers is to use long, complex passwords, which are changed regularly. Since changes were made to Ann’s desktop configuration settings while she was not at work, means that her password was compromised. 


Q499. Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks? 

A. Protocol filter 

B. Load balancer 

C. NIDS 

D. Layer 7 firewall 

Answer:

Explanation: 

An application-level gateway firewall filters traffic based on user access, group membership, the application or service used, or even the type of resources being transmitted. This type of firewall operates at the Application layer (Layer 7) of the OSI model. 


Q500. The fundamental information security principals include confidentiality, availability and which of the following? 

A. The ability to secure data against unauthorized disclosure to external sources 

B. The capacity of a system to resist unauthorized changes to stored information 

C. The confidence with which a system can attest to the identity of a user 

D. The characteristic of a system to provide uninterrupted service to authorized users 

Answer:

Explanation: Confidentiality, integrity, and availability, which make up the CIA triad, are the three most important concepts in security. In this instance, the answer describes the Integrity part of the CIA triad.