After you convey a CompTIA to the expertise, it is going to 1st benefit you by helping change your get the job done circulate. By means of furthering your understanding platform, you will find a improved expertise in what you are doing and then get the job done more expeditiously. Further, you will be aware on your path throughout the software program a lot better than many, that can typically will let you choose the speediest and many effective method for anyone to complete your current tasks. However it doesn?¡¥t basically close along with personal work productivity degrees and also learning all there is to know in relation to CompTIA systems.

2021 Dec SY0-401 free practice questions

Q191. The Chief Information Officer (CIO) is concerned with moving an application to a SaaS cloud provider. Which of the following can be implemented to provide for data confidentiality assurance during and after the migration to the cloud? 

A. HPM technology 

B. Full disk encryption 

C. DLP policy 

D. TPM technology 

Answer:

Explanation: 

Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data. The Software as a Service (SaaS) applications are remotely run over the Web and as such requires DLP monitoring. 


Q192. After visiting a website, a user receives an email thanking them for a purchase which they did not request. Upon investigation the security administrator sees the following source code in a pop-up window: 

<HTML> 

<body onload="document.getElementByID(‘badForm’).submit()"> 

<form id="badForm" action="shoppingsite.company.com/purchase.php" method="post" > 

<input name="Perform Purchase" value="Perform Purchase"/> 

</form> 

</body> 

</HTML> 

Which of the following has MOST likely occurred? 

A. SQL injection 

B. Cookie stealing 

C. XSRF 

D. XSS 

Answer:

Explanation: 

XSRF or cross-site request forgery applies to web applications and is an attack that exploits the web application’s trust of a user who known or is supposed to have been authenticated. This is often accomplished without the user’s knowledge. 


Q193. Visitors entering a building are required to close the back door before the front door of the same entry room is open. Which of the following is being described? 

A. Tailgating 

B. Fencing 

C. Screening 

D. Mantrap 

Answer:

Explanation: 

Mantraps are designed to contain an unauthorized, potentially hostile person/individual physically until authorities arrive. Mantraps are typically manufactured with bulletproof glass, high-strength doors, and locks and to allow the minimal amount of individuals depending on its size. Some mantraps even include scales that will weigh the person. The doors are designed in such a way as to open only when the mantrap is occupied or empty and not in-between. This means that the backdoor must first close before the front door will open; exactly what is required in this scenario. 


Q194. Which of the following tools would a security administrator use in order to identify all running services throughout an organization? 

A. Architectural review 

B. Penetration test 

C. Port scanner 

D. Design review 

Answer:

Explanation: 

Different services use different ports. When a service is enabled on a computer, a network port is opened for that service. For example, enabling the HTTP service on a web server will open port 80 on the server. By determining which ports are open on a remote server, we can determine which services are running on that server. A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. A port scan or portscan can be defined as a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port. While not a nefarious process in and of itself, it is one used by hackers to probe target machine services with the aim of exploiting a known vulnerability of that service. However the majority of uses of a port scan are not attacks and are simple probes to determine services available on a remote machine. 


Q195. Which of the following is an authentication service that uses UDP as a transport medium? 

A. TACACS+ 

B. LDAP 

C. Kerberos 

D. RADIUS 

Answer:

Explanation: RADIUS runs in the application layer and makes use of UDP as transport. 


Most up-to-date SY0-401 practice test:

Q196. Which of the following provides dedicated hardware-based cryptographic functions to an operating system and its applications running on laptops and desktops? 

A. TPM 

B. HSM 

C. CPU 

D. FPU 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Q197. Which of the following provides the strongest authentication security on a wireless network? 

A. MAC filter 

B. WPA2 

C. WEP 

D. Disable SSID broadcast 

Answer:

Explanation: 

The Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) authentication protocols were designed to address the core, easy-to-crack problems of WEP. 


Q198. An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols? 

A. TCP/IP 

B. SSL 

C. SCP 

D. SSH 

Answer:

Explanation: 

SSL (Secure Sockets Layer) is used for establishing an encrypted link between two computers, typically a web server and a browser. SSL is used to enable sensitive information such as login credentials and credit card numbers to be transmitted securely. 


Q199. The IT department has setup a website with a series of questions to allow end users to reset their own accounts. Which of the following account management practices does this help? 

A. Account Disablements 

B. Password Expiration 

C. Password Complexity 

D. Password Recovery 

Answer:

Explanation: 

People tend to forget their own passwords and because a user’s password in not stored on the operating system, only a hash value is kept and most operating systems allows the administrator to change the value meaning that the password can then be recovered. If you allow end users to reset their own accounts then the password recovery process is helped along. 


Q200. DRAG DROP 

Drag the items on the left to show the different types of security for the shown devices. Not all fields need to be filled. Not all items need to be used. 

Answer: 

Explanation: 

Mobile Device Security GPS tracking Remote wipe 

Device Encryption 

Strong password 

Server in Data Center Security 

FM-200 

Biometrics 

Proximity Badges 

Mantrap 

For mobile devices, at bare minimum you should have the following security measures in place: 

Screen lock, Strong password, Device encryption, Remote wipe/Sanitation, voice encryption, GPS tracking, Application control, Storage segmentation, Asset tracking as well as Device Access control. 

For servers in a data center your security should include: Fire extinguishers such as FM200 as part of fire suppression; Biometric, proximity badges, mantraps, HVAC, cable locks; these can all be physical security measures to control access to the server. 

References: 

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, 

Indianapolis, 2014, p 418