Pass4sure gurus frequently revise each of our review substances together with SY0-401 CompTIA accreditation review tutorial together with describe whenever they come to be feasible. SY0-401 exam Pass4sure deliver improvements no cost to your prospects. Youll take advantage of the best together with current material available anyplace out there, to help you to the check slot provided to discover the self confidence and knowledge to secure the test SY0-401 within your 1st true attempt. Pass4sure assure you will successfully pass the test SY0-401 the 1st time you are trying to apply one of our SY0-401 training solutions together with SY0-401.

2021 Feb SY0-401 test engine

Q111. A company is installing a new security measure that would allow one person at a time to be authenticated to an area without human interaction. Which of the following does this describe? 

A. Fencing 

B. Mantrap 

C. A guard 

D. Video surveillance 

Answer:

Explanation: 

Mantraps make use of electronic locks and are designed to allow you to limit the amount of individual allowed access to an area at any one time. 


Q112. An attacker used an undocumented and unknown application exploit to gain access to a file server. Which of the following BEST describes this type of attack? 

A. Integer overflow 

B. Cross-site scripting 

C. Zero-day 

D. Session hijacking 

E. XML injection 

Answer:

Explanation: 

The vulnerability is undocumented and unknown. This is zero day vulnerability. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. 


Q113. Ann has recently transferred from the payroll department to engineering. While browsing file shares, Ann notices she can access the payroll status and pay rates of her new coworkers. Which of the following could prevent this scenario from occurring? 

A. Credential management 

B. Continuous monitoring 

C. Separation of duties 

D. User access reviews 

Answer:

Explanation: 


Q114. A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure? 

A. IPsec 

B. SFTP 

C. BGP 

D. PPTP 

Answer:

Explanation: 

Layer 2 Tunneling Protocol (L2TP) came about through a partnership between Cisco and Microsoft with the intention of providing a more secure VPN protocol. L2TP is considered to be a more secure option than PPTP, as the IPSec protocol which holds more secure encryption algorithms, is utilized in conjunction with it. It also requires a pre-shared certificate or key. L2TP’s strongest level of encryption makes use of 168 bit keys, 3 DES encryption algorithm and requires two levels of authentication. L2TP has a number of advantages in comparison to PPTP in terms of providing data integrity and authentication of origin verification designed to keep hackers from compromising the system. However, the increased overhead required to manage this elevated security means that it performs at a slower pace than PPTP. 


Q115. Which of the following should Joe, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from his company? 

A. Privacy Policy 

B. Least Privilege 

C. Acceptable Use 

D. Mandatory Vacations 

Answer:

Explanation: 

When one person fills in for another, such as for mandatory vacations, it provides an opportunity to see what the person is doing and potentially uncover any fraud. 


Up to the minute SY0-401 exam cost:

Q116. Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network? 

A. HIPS on each virtual machine 

B. NIPS on the network 

C. NIDS on the network 

D. HIDS on each virtual machine 

Answer:

Explanation: 

Host-based intrusion prevention system (HIPS) is an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host. 


Q117. A security administrator wishes to increase the security of the wireless network. Which of the following BEST addresses this concern? 

A. Change the encryption from TKIP-based to CCMP-based. 

B. Set all nearby access points to operate on the same channel. 

C. Configure the access point to use WEP instead of WPA2. 

D. Enable all access points to broadcast their SSIDs. 

Answer:

Explanation: 

CCMP makes use of 128-bit AES encryption with a 48-bit initialization vector. This initialization vector makes cracking a bit more difficult. 


Q118. Ann, the network administrator, has learned from the helpdesk that employees are accessing the wireless network without entering their domain credentials upon connection. Once the connection is made, they cannot reach any internal resources, while wired network connections operate smoothly. Which of the following is MOST likely occurring? 

A. A user has plugged in a personal access point at their desk to connect to the network wirelessly. 

B. The company is currently experiencing an attack on their internal DNS servers. 

C. The company’s WEP encryption has been compromised and WPA2 needs to be implemented instead. 

D. An attacker has installed an access point nearby in an attempt to capture company information. 

Answer:

Explanation: 

The question implies that users should be required to enter their domain credentials upon connection to the wireless network. The fact that they are connecting to a wireless network without being prompted for their domain credentials and they are unable to access network resources suggests they are connecting to a rogue wireless network. A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security threat to large organizations with many employees, because anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network to unauthorized parties. Rogue access points of the second kind target networks that do not employ mutual authentication (client-server server-client) and may be used in conjunction with a rogue RADIUS server, depending on security configuration of the target network. To prevent the installation of rogue access points, organizations can install wireless intrusion prevention systems to monitor the radio spectrum for unauthorized access points. 


Q119. A security administrator must implement a firewall rule to allow remote employees to VPN onto the company network. The VPN concentrator implements SSL VPN over the standard HTTPS port. Which of the following is the MOST secure ACL to implement at the company's gateway firewall? 

A. PERMIT TCP FROM ANY 443 TO 199.70.5.25 443 

B. PERMIT TCP FROM ANY ANY TO 199.70.5.23 ANY 

C. PERMIT TCP FROM 199.70.5.23 ANY TO ANY ANY 

D. PERMIT TCP FROM ANY 1024-65535 TO 199.70.5.23 443 

Answer:

Explanation: 


Q120. Sara, a hacker, is completing a website form to request a free coupon. The site has a field that limits the request to 3 or fewer coupons. While submitting the form, Sara runs an application on her machine to intercept the HTTP POST command and change the field from 3 coupons to 30. 

Which of the following was used to perform this attack? 

A. SQL injection 

B. XML injection 

C. Packet sniffer 

D. Proxy 

Answer:

Explanation: 

When a web user takes advantage of a weakness with SQL by entering values that they should not, it is known as a SQL injection attack. Similarly, when the user enters values that query XML (known as XPath) with values that take advantage of exploits, it is known as an XML injection attack. XPath works in a similar manner to SQL, except that it does not have the same levels of access control, and taking advantage of weaknesses within can return entire documents. The best way to prevent XML injection attacks is to filter the user’s input and sanitize it to make certain that it does not cause XPath to return more data than it should.