It is more faster and easier to pass the CompTIA SY0-401 exam by using Breathing CompTIA CompTIA Security+ Certification questuins and answers. Immediate access to the Most recent SY0-401 Exam and find the same core area SY0-401 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Dec SY0-401 free download

Q661. Ann an employee is visiting Joe, an employee in the Human Resources Department. While talking to Joe, Ann notices a spreadsheet open on Joe’s computer that lists the salaries of all employees in her department. Which of the following forms of social engineering would BEST describe this situation? 

A. Impersonation 

B. Dumpster diving 

C. Tailgating 

D. Shoulder surfing 

Answer:

Explanation: 

Ann was able to see the Spreadsheet on Joe’s computer. This direct observation is known as shoulder surfing. 

Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is an effective way to get information in crowded places because it's relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done long distance with the aid of binoculars or other vision-enhancing devices. To prevent shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand. 


Q662. Which of the following BEST describes the type of attack that is occurring? (Select TWO). 

A. DNS spoofing 

B. Man-in-the-middle 

C. Backdoor 

D. Replay 

E. ARP attack 

F. Spear phishing 

G. Xmas attack 

Answer: A,E 

Explanation: 

We have a legit bank web site and a hacker bank web site. The hacker has a laptop connected to the network. The hacker is redirecting bank web site users to the hacker bank web site instead of the legit bank web site. This can be done using two methods: DNS Spoofing and ARP Attack (ARP Poisoning). 

A: DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver's cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer (or any other computer). A domain name system server translates a human-readable domain name (such as example.com) into a numerical IP address that is used to route communications between nodes. Normally if the server doesn't know a requested translation it will ask another server, and the process continues recursively. To increase performance, a server will typically remember (cache) these translations for a certain amount of time, so that, if it receives another request for the same translation, it can reply without having to ask the other server again. When a DNS server has received a false translation and caches it for performance optimization, it is considered poisoned, and it supplies the false data to clients. If a DNS server is poisoned, it may return an incorrect IP address, diverting traffic to another computer (in this case, the hacker bank web site server). 

E: Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets. This modifies the layer -Ethernet MAC address into the hacker's known MAC address to monitor it. Because the ARP replies are forged, the target computer unintentionally sends the frames to the hacker's computer first instead of sending it to the original destination. As a result, both the user's data and privacy are compromised. An effective ARP poisoning attempt is undetectable to the user. ARP poisoning is also known as ARP cache poisoning or ARP poison routing (APR). 


Q663. A security administrator must implement a firewall rule to allow remote employees to VPN onto the company network. The VPN concentrator implements SSL VPN over the standard HTTPS port. Which of the following is the MOST secure ACL to implement at the company's gateway firewall? 

A. PERMIT TCP FROM ANY 443 TO 199.70.5.25 443 

B. PERMIT TCP FROM ANY ANY TO 199.70.5.23 ANY 

C. PERMIT TCP FROM 199.70.5.23 ANY TO ANY ANY 

D. PERMIT TCP FROM ANY 1024-65535 TO 199.70.5.23 443 

Answer:

Explanation: 


Q664. A security administrator is reviewing the below output from a password auditing tool: 

P@ss. 

@pW1. 

S3cU4 

Which of the following additional policies should be implemented based on the tool’s output? 

A. Password age 

B. Password history 

C. Password length 

D. Password complexity 

Answer:

Explanation: 

The output shows that all the passwords are either 4 or 5 characters long. This is way too short, 8 characters are shown to be the minimum for password length. 


Q665. A company replaces a number of devices with a mobile appliance, combining several functions. 

Which of the following descriptions fits this new implementation? (Select TWO). 

A. Cloud computing 

B. Virtualization 

C. All-in-one device 

D. Load balancing 

E. Single point of failure 

Answer: C,E 

Explanation: 

The disadvantages of combining everything into one include a potential single point of failure, and the dependence on the one vendor. The all –in-one device represents a single point of failure risk being taken on. 


Most up-to-date SY0-401 practice test:

Q666. Which of the following malware types is MOST likely to execute its payload after Jane, an employee, has left the company? 

A. Rootkit 

B. Logic bomb 

C. Worm 

D. Botnet 

Answer:

Explanation: 

This is an example of a logic bomb. The logic bomb is configured to ‘go off’ or when Jane has left the company. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files should they ever be terminated from the company. Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as Friday the 13th or April Fool's Day. Trojans that activate on certain dates are often called "time bombs". To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that disables certain functionality after a set time are not normally regarded as logic bombs. 


Q667. The common method of breaking larger network address space into smaller networks is known as: 

A. subnetting. 

B. phishing. 

C. virtualization. 

D. packet filtering. 

Answer:

Explanation: 


Q668. Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group. Which of the following would prevent her from denying accountability? 

A. Email Encryption 

B. Steganography 

C. Non Repudiation 

D. Access Control 

Answer:

Explanation: 

Nonrepudiation prevents one party from denying actions they carried out. 


Q669. After an audit, it was discovered that the security group memberships were not properly adjusted for employees’ accounts when they moved from one role to another. Which of the following has the organization failed to properly implement? (Select TWO). 

A. Mandatory access control enforcement. 

B. User rights and permission reviews. 

C. Technical controls over account management. 

D. Account termination procedures. 

E. Management controls over account management. 

F. Incident management and response plan. 

Answer: B,E 

Explanation: 

Reviewing user rights and permissions can be used to determine that all groups, users, and other accounts have the appropriate privileges assigned according to the policies of the corporation and their job descriptions since they were all moved to different roles. Control over account management would have taken into account the different roles that employees have and adjusted the rights and permissions of these roles accordingly. 


Q670. A network administrator has recently updated their network devices to ensure redundancy is in place so that: 

A. switches can redistribute routes across the network. 

B. environmental monitoring can be performed. 

C. single points of failure are removed. 

D. hot and cold aisles are functioning. 

Answer:

Explanation: 

Redundancy refers to systems that either are duplicated or fail over to other systems in the event of a malfunction. The best way to remove an SPOF from your environment is to add redundancy.