★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


We provide real comptia security+ sy0 401 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass CompTIA sy0 401 dump Exam quickly & easily. The sy0 401 dump PDF type is available for reading and printing. You can print more and practice many times. With the help of our CompTIA comptia sy0 401 dumps pdf and vce product and material, you can easily pass the sy0 401 braindump exam.

Q51. Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. 

After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue? 

A. Spam filter 

B. Protocol analyzer 

C. Web application firewall 

D. Load balancer 

Answer:

Explanation: 

A protocol analyzer is a tool used to examine the contents of network traffic. Commonly known as a sniffer, a protocol analyzer can be a dedicated hardware device or software installed onto a typical host system. In either case, a protocol analyzer is first a packet capturing tool that can collect network traffic and store it in memory or onto a storage device. Once a packet is captured, it can be analyzed either with complex automated tools and scripts or manually. 


Q52. Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE). 

A. Spam filter 

B. Load balancer 

C. Antivirus 

D. Proxies 

E. Firewall 

F. NIDS 

G. URL filtering 

Answer: D,E,G 

Explanation: 

A proxy server is a server that acts as an intermediary for requests from clients seeking resources 

from other servers. 

Firewalls manage traffic using a rule or a set of rules. 

A URL is a reference to a resource that specifies the location of the resource. A URL filter is used 

to block access to a site based on all or part of a URL. 


Q53. The method to provide end users of IT systems and applications with requirements related to acceptable use, privacy, new threats and trends, and use of social networking is: 

A. Security awareness training. 

B. BYOD security training. 

C. Role-based security training. 

D. Legal compliance training. 

Answer:

Explanation: 

Security awareness and training are critical to the success of a security effort. They include explaining policies, procedures, and current threats to both users and management. 


Q54. Several employees submit the same phishing email to the administrator. The administrator finds that the links in the email are not being blocked by the company’s security device. Which of the following might the administrator do in the short term to prevent the emails from being received? 

A. Configure an ACL 

B. Implement a URL filter 

C. Add the domain to a block list 

D. Enable TLS on the mail server 

Answer:

Explanation: 

Blocking e-mail is the same as preventing the receipt of those e-mails and this is done by applying a filter. But the filter must be configured to block it. Thus you should add that specific domain from where the e-mails are being sent to the list of addresses that is to be blocked. 


Q55. Encryption used by RADIUS is BEST described as: 

A. Quantum 

B. Elliptical curve 

C. Asymmetric 

D. Symmetric 

Answer:

Explanation: 

The RADIUS server uses a symmetric encryption method. 

Note: Symmetric algorithms require both ends of an encrypted message to have the same key and 

processing algorithms. Symmetric algorithms generate a secret key that must be protected. 


Q56. Ann an employee is visiting Joe, an employee in the Human Resources Department. While talking to Joe, Ann notices a spreadsheet open on Joe’s computer that lists the salaries of all employees in her department. Which of the following forms of social engineering would BEST describe this situation? 

A. Impersonation 

B. Dumpster diving 

C. Tailgating 

D. Shoulder surfing 

Answer:

Explanation: 

Ann was able to see the Spreadsheet on Joe’s computer. This direct observation is known as shoulder surfing. 

Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is an effective way to get information in crowded places because it's relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done long distance with the aid of binoculars or other vision-enhancing devices. To prevent shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand. 


Q57. A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates. 

Which of the following processes could MOST effectively mitigate these risks? 

A. Application hardening 

B. Application change management 

C. Application patch management 

D. Application firewall review 

Answer:

Explanation: 

The question states that operating system updates are applied but not other software updates. The ‘other software’ in this case would be applications. Software updates includes functionality updates and more importantly security updates. The process of applying software updates or ‘patches’ to applications is known as ‘application patch management’. Application patch management is an effective way of mitigating security risks associated with software applications. 


Q58. Ann, the network administrator, is receiving reports regarding a particular wireless network in the building. The network was implemented for specific machines issued to the developer department, but the developers are stating that they are having connection issues as well as slow bandwidth. Reviewing the wireless router's logs, she sees that devices not belonging to the developers are connecting to the access point. Which of the following would BEST alleviate the developer's reports? 

A. Configure the router so that wireless access is based upon the connecting device's hardware address. 

B. Modify the connection's encryption method so that it is using WEP instead of WPA2. 

C. Implement connections via secure tunnel with additional software on the developer's computers. 

D. Configure the router so that its name is not visible to devices scanning for wireless networks. 

Answer:

Explanation: 


Q59. A CA is compromised and attacks start distributing maliciously signed software updates. Which of the following can be used to warn users about the malicious activity? 

A. Key escrow 

B. Private key verification 

C. Public key verification 

D. Certificate revocation list 

Answer:

Explanation: 

If we put the root certificate of the comprised CA in the CRL, users will know that this CA (and the certificates that it has issued) no longer can be trusted. The CRL (Certificate revocation list) is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued them, are also included. In addition, each list contains a proposed date for the next release. 


Q60. A security engineer is asked by the company’s development team to recommend the most secure method for password storage. 

Which of the following provide the BEST protection against brute forcing stored passwords? (Select TWO). 

A. PBKDF2 

B. MD5 

C. SHA2 

D. Bcrypt 

E. AES 

F. CHAP 

Answer: A,D 

Explanation: 

A: PBKDF2 (Password-Based Key Derivation Function 2) is part of PKCS #5 v. 2.01. It applies some function (like a hash or HMAC) to the password or passphrase along with Salt to produce a derived key. 

D: bcrypt is a key derivation function for passwords based on the Blowfish cipher. Besides incorporating a salt to protect against rainbow table attacks, bcrypt is an adaptive function: over time, the iteration count can be increased to make it slower, so it remains resistant to brute-force search attacks even with increasing computation power. The bcrypt function is the default password hash algorithm for BSD and many other systems. 

References: 

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, 

Indianapolis, 2014, pp 109-110, 139, 143, 250, 255-256, 256