CompTIA SY0-401 Recognition Assessment is usually involving heart magnitude within your current Qualified lifetime and Recognition Way. Are you searching for precise SY0-401 review responses? Actualtests is your best option. While using Actualtests SY0-401 Review Substances, you not only acquire answers since you may properly hope via CompTIA SY0-401 braindumps websites, and you buy qualified and legitimate details so that you purchase a organization learn in the information. Actualtests is the sign for supplying high quality and cost-effective SY0-401 review and SY0-401 having Actualtests Money back guarantee. Once we mention Guranteed SY0-401 Assessment Accomplishment, in which case you find 1 brand and that is Actualtests. Which includes almost certainly maximum Accomplishment ration in Recognition World.

2021 Jan SY0-401 exam answers

Q531. A security administrator wants to get a real time look at what attackers are doing in the wild, hoping to lower the risk of zero-day attacks. Which of the following should be used to accomplish this goal? 

A. Penetration testing 

B. Honeynets 

C. Vulnerability scanning 

D. Baseline reporting 

Answer:

Explanation: 

A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. The Honeynet Project, a non-profit research organization dedicated to computer security and information sharing, actively promotes the deployment of honeynets. 

In addition to the honey pots, a honeynet usually has real applications and services so that it seems like a normal network and a worthwhile target. However, because the honeynet doesn't actually serve any authorized users, any attempt to contact the network from without is likely an illicit attempt to breach its security, and any outbound activity is likely evidence that a system has been compromised. For this reason, the suspect information is much more apparent than it would be in an actual network, where it would have to be found amidst all the legitimate network data. Applications within a honeynet are often given names such as "Finances" or "Human Services" to make them sound appealing to the attacker. 

A virtual honeynet is one that, while appearing to be an entire network, resides on a single server. 


Q532. The finance department works with a bank which has recently had a number of cyber attacks. The finance department is concerned that the banking website certificates have been compromised. Which of the following can the finance department check to see if any of the bank’s certificates are still valid? 

A. Bank’s CRL 

B. Bank’s private key 

C. Bank’s key escrow 

D. Bank’s recovery agent 

Answer:

Explanation: 

The finance department can check if any of the bank's certificates are in the CRL or not. If a certificate is not in the CRL then it is still valid. The CRL (Certificate revocation list) is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued them, are also included. In addition, each list contains a proposed date for the next release. 


Q533. A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following? 

A. Availability 

B. Integrity 

C. Confidentiality 

D. Fire suppression 

Answer:

Explanation: 

Availability means simply to make sure that the data and systems are available for authorized users. Data backups, redundant systems, and disaster recovery plans all support availability; as does environmental support by means of HVAC. 


Q534. A security administrator wishes to change their wireless network so that IPSec is built into the protocol and NAT is no longer required for address range extension. Which of the following protocols should be used in this scenario? 

A. WPA2 

B. WPA 

C. IPv6 

D. IPv4 

Answer:

Explanation: 

IPSec security is built into IPv6. 


Q535. A malicious program modified entries in the LMHOSTS file of an infected system. Which of the following protocols would have been affected by this? 

A. ICMP 

B. BGP 

C. NetBIOS 

D. DNS 

Answer:

Explanation: 

The LMHOSTS file provides a NetBIOS name resolution method that can be used for small networks that do not use a WINS server. NetBIOS has been adapted to run on top of TCP/IP, and is still extensively used for name resolution and registration in Windows-based environments. 


Most up-to-date SY0-401 exam question:

Q536. The company’s sales team plans to work late to provide the Chief Executive Officer (CEO) with a special report of sales before the quarter ends. After working for several hours, the team finds they cannot save or print the reports. 

Which of the following controls is preventing them from completing their work? 

A. Discretionary access control 

B. Role-based access control 

C. Time of Day access control 

D. Mandatory access control 

Answer:

Explanation: 

Time of day restrictions limit when users can access specific systems based on the time of day or week. It can limit access to sensitive environments to normal business hours when oversight and monitoring can be performed to prevent fraud, abuse, or intrusion. In this case, the sales team is prevented from saving or printing reports after a certain time. 


Q537. After viewing wireless traffic, an attacker notices the following networks are being broadcasted by local access points: 

Corpnet Coffeeshop 

FreePublicWifi 

Using this information the attacker spoofs a response to make nearby laptops connect back to a malicious device. Which of the following has the attacker created? 

A. Infrastructure as a Service 

B. Load balancer 

C. Evil twin 

D. Virtualized network 

Answer:

Explanation: 

In this question, the attacker has created another wireless network that is impersonating one of more of the three wireless networks listed in the question. This is known as an Evil Twin. An evil twin, in the context of network security, is a rogue or fake wireless access point (WAP) that appears as a genuine hotspot offered by a legitimate provider. In an evil twin attack, an eavesdropper or hacker fraudulently creates this rogue hotspot to collect the personal data of unsuspecting users. Sensitive data can be stolen by spying on a connection or using a phishing technique. For example, a hacker using an evil twin exploit may be positioned near an authentic Wi-Fi access point and discover the service set identifier (SSID) and frequency. The hacker may then send a radio signal using the exact same frequency and SSID. To end users, the rogue evil twin appears as their legitimate hotspot with the same name. In wireless transmissions, evil twins are not a new phenomenon. Historically, they were known as honeypots or base station clones. With the advancement of wireless technology and the use of wireless devices in public areas, it is very easy for novice users to set up evil twin exploits. 


Q538. Which of the following tools would a security administrator use in order to identify all running services throughout an organization? 

A. Architectural review 

B. Penetration test 

C. Port scanner 

D. Design review 

Answer:

Explanation: 

Different services use different ports. When a service is enabled on a computer, a network port is opened for that service. For example, enabling the HTTP service on a web server will open port 80 on the server. By determining which ports are open on a remote server, we can determine which services are running on that server. A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. A port scan or portscan can be defined as a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port. While not a nefarious process in and of itself, it is one used by hackers to probe target machine services with the aim of exploiting a known vulnerability of that service. However the majority of uses of a port scan are not attacks and are simple probes to determine services available on a remote machine. 


Q539. Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee’s credential? 

A. Account expiration 

B. Password complexity 

C. Account lockout 

D. Dual factor authentication 

Answer:

Explanation: 

Account expiration is a secure feature to employ on user accounts for temporary workers, interns, or consultants. It automatically disables a user account or causes the account to expire at a specific time and on a specific day. 


Q540. After a recent breach, the security administrator performs a wireless survey of the corporate network. The security administrator notices a problem with the following output: 

MAC SSID ENCRYPTION POWER BEACONS 

00:10:A1:36:12:CC MYCORP WPA2 CCMP 60 1202 

00:10:A1:49:FC:37 MYCORP WPA2 CCMP 70 9102 

FB:90:11:42:FA:99 MYCORP WPA2 CCMP 40 3031 

00:10:A1:AA:BB:CC MYCORP WPA2 CCMP 55 2021 00:10:A1:FA:B1:07 MYCORP WPA2 CCMP 30 6044 

Given that the corporate wireless network has been standardized, which of the following attacks is underway? 

A. Evil twin 

B. IV attack 

C. Rogue AP 

D. DDoS 

Answer:

Explanation: 

The question states that the corporate wireless network has been standardized. By ‘standardized’ it means the wireless network access points are running on hardware from the same vendor. We can see this from the MAC addresses used. The first half of a MAC address is vendor specific. The second half is network adapter specific. We have four devices with MAC addresses that start with 00:10:A1. The “odd one out” is the device with a MAC address starting FB:90:11. This device is from a different vendor. The SSID of the wireless network on this access point is the same as the other legitimate access points. Therefore, the access point with a MAC address starting FB:90:11 is impersonating the corporate access points. This is known as an Evil Twin. 

An evil twin, in the context of network security, is a rogue or fake wireless access point (WAP) that appears as a genuine hotspot offered by a legitimate provider. In an evil twin attack, an eavesdropper or hacker fraudulently creates this rogue hotspot to collect the personal data of unsuspecting users. Sensitive data can be stolen by spying on a connection or using a phishing technique. For example, a hacker using an evil twin exploit may be positioned near an authentic Wi-Fi access point and discover the service set identifier (SSID) and frequency. The hacker may then send a radio signal using the exact same frequency and SSID. To end users, the rogue evil twin appears as their legitimate hotspot with the same name. In wireless transmissions, evil twins are not a new phenomenon. Historically, they were known as honeypots or base station clones. With the advancement of wireless technology and the use of wireless devices in public areas, it is very easy for novice users to set up evil twin exploits.