Want to know Pass4sure SY0-401 Exam practice test features? Want to lear more about CompTIA CompTIA Security+ Certification certification experience? Study Highest Quality CompTIA SY0-401 answers to Most recent SY0-401 questions at Pass4sure. Gat a success with an absolute guarantee to pass CompTIA SY0-401 (CompTIA Security+ Certification) test on your first attempt.

2021 Dec SY0-401 exam guide

Q121. Which of the following can only be mitigated through the use of technical controls rather that user security training? 

A. Shoulder surfing 

B. Zero-day 

C. Vishing 

D. Trojans 

Answer:

Explanation: 

A zero day vulnerability is an unknown vulnerability in a software application. This cannot be prevented by user security training. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. 


Q122. Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message is 160-bits long. Which of the following hashing methods would Matt have to use to obtain this digital fingerprint? 

A. SHA1 

B. MD2 

C. MD4 

D. MD5 

Answer:

Explanation: 

The Secure Hash Algorithm (SHA) was designed to ensure the integrity of a message. SHA is a one-way hash that provides a hash value that can be used with an encryption protocol. This algorithm produces a 160-bit hash value. SHA (1 or 2) is preferred over Message Digest Algorithm. 


Q123. A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization? 

A. LDAP 

B. RADIUS 

C. Kerberos 

D. XTACACS 

Answer:

Explanation: 

The fundamental component of a Kerberos solution is the key distribution centre (KDC), which is responsible for verifying the identity of principles and granting and controlling access within a network environment through the use of secure cryptographic keys and tickets. 


Q124. Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network? 

A. Application white listing 

B. Remote wiping 

C. Acceptable use policy 

D. Mobile device management 

Answer:

Explanation: 

Mobile device management (MDM) is allows for managing the mobile devices that employees use to access company resources. MDM is intended to improve security, provide monitoring, enable remote management, and support troubleshooting. It can be used to push or remove applications, manage data, and enforce configuration settings on these devices. 


Q125. A security manager must remain aware of the security posture of each system. Which of the following supports this requirement? 

A. Training staff on security policies 

B. Establishing baseline reporting 

C. Installing anti-malware software 

D. Disabling unnecessary accounts/services 

Answer:

Explanation: 

The IT baseline protection approach is a methodology to identify and implement computer security 

measures in an organization. The aim is the achievement of an adequate and appropriate level of 

security for IT systems. This is known as a baseline. 

A baseline report compares the current status of network systems in terms of security updates, 

performance or other metrics to a predefined set of standards (the baseline). 


Renovate SY0-401 latest exam:

Q126. Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment? 

A. Protocol analyzer 

B. Router 

C. Firewall 

D. HIPS 

Answer:

Explanation: 

A Protocol Analyzer is a hardware device or more commonly a software program used to capture 

network data communications sent between devices on a network. Capturing and analyzing the 

packets sent from two systems that are not communicating properly could help determine the 

cause of the issue. 

Well known software protocol analyzers include Message Analyzer (formerly Network Monitor) 

from Microsoft and Wireshark (formerly Ethereal). 


Q127. When an order was submitted via the corporate website, an administrator noted special characters (e.g., ";--" and "or 1=1 --") were input instead of the expected letters and numbers. 

Which of the following is the MOST likely reason for the unusual results? 

A. The user is attempting to highjack the web server session using an open-source browser. 

B. The user has been compromised by a cross-site scripting attack (XSS) and is part of a botnet performing DDoS attacks. 

C. The user is attempting to fuzz the web server by entering foreign language characters which are incompatible with the website. 

D. The user is sending malicious SQL injection strings in order to extract sensitive company or customer data via the website. 

Answer:

Explanation: 

The code in the question is an example of a SQL Injection attack. The code ‘1=1’ will always provide a value of true. This can be included in statement designed to return all rows in a SQL table. 

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. 


Q128. Which of the following network devices is used to analyze traffic between various network interfaces? 

A. Proxies 

B. Firewalls 

C. Content inspection 

D. Sniffers 

Answer:

Explanation: 

A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If computers are connected to a local area network that is not filtered or switched, the traffic can be broadcast to all computers contained in the same segment. This doesn’t generally occur, since computers are generally told to ignore all the comings and goings of traffic from other computers. However, in the case of a sniffer, all traffic is shared when the sniffer software commands the Network Interface Card (NIC) to stop ignoring the traffic. The NIC is put into promiscuous mode, and it reads communications between computers within a particular segment. This allows the sniffer to seize everything that is flowing in the network, which can lead to the unauthorized access of sensitive data. A packet sniffer can take the form of either a hardware or software solution. A sniffer is also known as a packet analyzer. 


Q129. Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? 

A. Man-in-the-middle 

B. Bluejacking 

C. Bluesnarfing 

D. Packet sniffing 

Answer:

Explanation: 

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters. Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in guerrilla marketing campaigns to promote advergames. 


Q130. An employee connects a wireless access point to the only jack in the conference room to provide Internet access during a meeting. The access point is configured to use WPA2-TKIP. A malicious user is able to intercept clear text HTTP communication between the meeting attendees and the Internet. Which of the following is the reason the malicious user is able to intercept and see the clear text communication? 

A. The malicious user has access to the WPA2-TKIP key. 

B. The wireless access point is broadcasting the SSID. 

C. The malicious user is able to capture the wired communication. 

D. The meeting attendees are using unencrypted hard drives. 

Answer:

Explanation: