It is more faster and easier to pass the CompTIA SY0-401 exam by using Printable CompTIA CompTIA Security+ Certification questuins and answers. Immediate access to the Down to date SY0-401 Exam and find the same core area SY0-401 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Jan SY0-401 download

Q391. Which of the following password attacks is MOST likely to crack the largest number of randomly generated passwords? 

A. Hybrid 

B. Birthday attack 

C. Dictionary 

D. Rainbow tables 

Answer:

Explanation: 


Q392. A security administrator has been tasked to ensure access to all network equipment is controlled by a central server such as TACACS+. This type of implementation supports which of the following risk mitigation strategies? 

A. User rights and permissions review 

B. Change management 

C. Data loss prevention 

D. Implement procedures to prevent data theft 

Answer:

Explanation: 

Terminal Access Controller Access-Control System (TACACS, and variations like XTACACS and TACACS+) is a client/server-oriented environment, and it operates in a manner similar to RADIUS. Furthermore TACACS+ allows for credential to be accepted from multiple methods. Thus you can perform user rights and permission reviews with TACACS+. 


Q393. Which of the following is an application security coding problem? 

A. Error and exception handling 

B. Patch management 

C. Application hardening 

D. Application fuzzing 

Answer:

Explanation: 

Exception handling is an aspect of secure coding. When errors occur, the system should revert back to a secure state. This must be coded into the system by the programmer, and should capture errors and exceptions so that they could be handled by the application. 


Q394. Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE). 

A. RC4 

B. 3DES 

C. AES 

D. MD5 

E. PGP 

F. Blowfish 

Answer: B,C,F 

Explanation: 

B: Triple DES (3DES) is the common name for the Triple Data Encryption Algorithm (TDEA or Triple DEA) symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. 

C: Advanced Encryption Standard (AES) is a block cipher that has replaced DES as the current standard, and it uses the Rijndael algorithm. It was developed by Joan Daemen and Vincent Rijmen. AES is the current product used by U.S. governmental agencies. 

F: Blowfish is an encryption system invented by a team led by Bruce Schneier that performs a 64-bit block cipher at very fast speeds. 


Q395. Which of the following is mainly used for remote access into the network? 

A. XTACACS 

B. TACACS+ 

C. Kerberos 

D. RADIUS 

Answer:

Explanation: 

Most gateways that control access to the network have a RADIUS client component that communicates with the RADIUS server. Therefore, it can be inferred that RADIUS is primarily used for remote access. 


Update SY0-401 exam guide:

Q396. A small company wants to employ PKI. The company wants a cost effective solution that must be simple and trusted. They are considering two options: X.509 and PGP. Which of the following would be the BEST option? 

A. PGP, because it employs a web-of-trust that is the most trusted form of PKI. 

B. PGP, because it is simple to incorporate into a small environment. 

C. X.509, because it uses a hierarchical design that is the most trusted form of PKI. 

D. X.509, because it is simple to incorporate into a small environment. 

Answer:

Explanation: 


Q397. Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal? 

A. Firewall 

B. Switch 

C. URL content filter 

D. Spam filter 

Answer:

Explanation: 

URL filtering, also known as web filtering, is the act of blocking access to a site based on all or part of the URL used to request access. URL filtering can focus on all or part of a fully qualified domain name (FQDN), specific path names, specific filenames, specific fi le extensions, or entire specific URLs. Many URL-filtering tools can obtain updated master URL block lists from vendors as well as allow administrators to add or remove URLs from a custom list. 


Q398. Users report that after downloading several applications, their systems’ performance has noticeably decreased. Which of the following would be used to validate programs prior to installing them? 

A. Whole disk encryption 

B. SSH 

C. Telnet 

D. MD5 

Answer:

Explanation: 

MD5 can be used to locate the data which has changed. 

The Message Digest Algorithm (MD) creates a hash value and uses a one-way hash. The hash 

value is used to help maintain integrity. There are several versions of MD; the most common are 

MD5, MD4, and MD2. 


Q399. Which of the following would be used as a secure substitute for Telnet? 

A. SSH 

B. SFTP 

C. SSL 

D. HTTPS 

Answer:

Explanation: 

Secure Shell (SSH) is a tunneling protocol originally designed for Unix systems. It uses encryption to establish a secure connection between two systems. SSH also provides alternative, security-equivalent programs for such Unix standards as Telnet, FTP, and many other communications-oriented applications. SSH is available for use on Windows systems as well. This makes it the preferred method of security for Telnet and other cleartext oriented programs in the Unix environment. 


Q400. RADIUS provides which of the following? 

A. Authentication, Authorization, Availability 

B. Authentication, Authorization, Auditing 

C. Authentication, Accounting, Auditing 

D. Authentication, Authorization, Accounting 

Answer:

Explanation: 

The Remote Authentication Dial In User Service (RADIUS) networking protocol offers centralized Authentication, Authorization, and Accounting (AAA) management for users who make use of a network service. It is for this reason that A, B, and C: are incorrect. 

References: http://en.wikipedia.org/wiki/RADIUS