Examcollections CompTIA certification exam training materials contain the core expertise and that may appear in the real exam. Many of us keep serving the customers together with the best merchandise. With the check engine, you can identify weak regions to prepare yourself better. Get notes around the Pdf files and circumscribe the actual errors in red. Review the actual errors once again; then you will master the comprehensive expertise and create full preparation for your CompTIA certification exam.

2021 Dec SY0-401 exam cram

Q581. A corporation is looking to expand their data center but has run out of physical space in which to store hardware. Which of the following would offer the ability to expand while keeping their current data center operated by internal staff? 

A. Virtualization 

B. Subnetting 

C. IaaS 

D. SaaS 

Answer:

Explanation: 

Virtualization allows a single set of hardware to host multiple virtual machines. 


Q582. During an audit, the security administrator discovers that there are several users that are no longer employed with the company but still have active user accounts. Which of the following should be performed? 

A. Account recovery 

B. Account disablement 

C. Account lockouts 

D. Account expiration 

Answer:

Explanation: 

Account Disablement should be implemented when a user will be gone from a company whether they leave temporary or permanently. In the case of permanently leaving the company the account should be disabled. Disablement means that the account will no longer be an active account. 


Q583. It has been discovered that students are using kiosk tablets intended for registration and scheduling to play games and utilize instant messaging. Which of the following could BEST eliminate this issue? 

A. Device encryption 

B. Application control 

C. Content filtering 

D. Screen-locks 

Answer:

Explanation: 


Q584. A server administrator notes that a legacy application often stops running due to a memory error. When reviewing the debugging logs, they notice code being run calling an internal process to exploit the machine. Which of the following attacks does this describe? 

A. Zero-day 

B. Buffer overflow 

C. Cross site scripting 

D. Malicious add-on 

Answer:

Explanation: 

This question describes a buffer overflow attack. 

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability. 


Q585. Jane, a VPN administrator, was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Jane select for the tunnel encryption? 

A. Blowfish 

B. DES 

C. SHA256 

D. HMAC 

Answer:

Explanation: 

Blowfish is an encryption system that performs a 64-bit block cipher at very fast speeds. It is a symmetric block cipher that can use variable-length keys (from 32 bits to 448 bits). Among the alternatives listed above, it is the only cipher that can use a 128-bit key and which does provide additional security through a symmetric key. 


Far out SY0-401 exam question:

Q586. Which of the following types of application attacks would be used to specifically gain unauthorized information from databases that did not have any input validation implemented? 

A. SQL injection 

B. Session hijacking and XML injection 

C. Cookies and attachments 

D. Buffer overflow and XSS 

Answer:

Explanation: 

To access information in databases, you use SQL. To gain unauthorized information from databases, a SQL Injection attack is used. 

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. 


Q587. A security engineer, Joe, has been asked to create a secure connection between his mail server and the mail server of a business partner. Which of the following protocol would be MOST appropriate? 

A. HTTPS 

B. SSH 

C. FTP 

D. TLS 

Answer:

Explanation: Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom it is communicating, and to exchange a symmetric key. The TLS protocol allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering. 


Q588. A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer will have very different job requirements and use unique tools and applications in their job. Which of the following is MOST appropriate to use? 

A. Role-based privileges 

B. Credential management 

C. User assigned privileges 

D. User access 

Answer:

Explanation: 


Q589. The system administrator has been notified that many users are having difficulty connecting to the company’s wireless network. They take a new laptop and physically go to the access point and connect with no problems. Which of the following would be the MOST likely cause? 

A. The certificate used to authenticate users has been compromised and revoked. 

B. Multiple war drivers in the parking lot have exhausted all available IPs from the pool to deny access. 

C. An attacker has gained access to the access point and has changed the encryption keys. 

D. An unauthorized access point has been configured to operate on the same channel. 

Answer:

Explanation: 

Wireless Access Points can be configured to use a channel. If you have multiple access points within range of each other, you should configure the access points to use different channels. Different channels use different frequencies. If you have two access points using the same channel, their wifi signals will interfere with each other. The question states that that many users are having difficulty connecting to the company’s wireless network. This is probably due to the signal being weakened by interference from another access point using the same channel. When the administrator takes a new laptop and physically goes to the access point and connects with no problems, he is able to connect because he is near the access point and therefore has a strong signal. 


Q590. A company that has a mandatory vacation policy has implemented which of the following controls? 

A. Risk control 

B. Privacy control 

C. Technical control 

D. Physical control 

Answer:

Explanation: 

Risk mitigation is done anytime you take steps to reduce risks. Thus mandatory vacation implementation is done as a risk control measure because it is a step that is taken as risk mitigation.