CompTIA SY0-401 Accreditation Audit can be for key relevance at ones Expert life plus Accreditation Route. Do you need real SY0-401 exam replies? Pass4sure will be your most suitable choice. With all the Pass4sure SY0-401 Analyze Components, you not simply receive answers because you might well anticipate from CompTIA SY0-401 braindumps web-sites, but you go for qualified plus correct arguments so that you can receive a firm knowledge in the information and facts. Pass4sure could be the image for furnishing quality plus cost-effective SY0-401 exam plus SY0-401 having Pass4sure Cash back guarantee. When we finally talk about Guranteed SY0-401 Audit Achievement, in which case you encounter a single identify that is Pass4sure. Which contains quite possibly highest Achievement ration inside Accreditation Earth.

2021 Jan SY0-401 free practice test

Q121. ON NO: 50 

The Human Resources department has a parent shared folder setup on the server. There are two groups that have access, one called managers and one called staff. There are many sub folders under the parent shared folder, one is called payroll. The parent folder access control list propagates all subfolders and all subfolders inherit the parent permission. Which of the following is the quickest way to prevent the staff group from gaining access to the payroll folder? 

A. Remove the staff group from the payroll folder 

B. Implicit deny on the payroll folder for the staff group 

C. Implicit deny on the payroll folder for the managers group 

D. Remove inheritance from the payroll folder 

Answer:

Explanation: Implicit deny is the default security stance that says if you aren’t specifically granted access or privileges for a resource, you’re denied access by default. 


Q122. Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network? 

A. Cross-platform compatibility issues between personal devices and server-based applications 

B. Lack of controls in place to ensure that the devices have the latest system patches and signature files 

C. Non-corporate devices are more difficult to locate when a user is terminated 

D. Non-purchased or leased equipment may cause failure during the audits of company-owned assets 

Answer:

Explanation: 

With employees who want to bring their own devices you will have to make them understand why they cannot. You do not want them plugging in a flash drive, let alone a camera, smartphone, tablet computer, or other device, on which company fi les could get intermingled with personal files. Allowing this to happen can create situations where data can leave the building that shouldn’t as well as introduce malware to the system. Employees should not sync unauthorized smartphones to their work systems. Some smartphones use multiple wireless spectrums and unwittingly open up the possibility for an attacker in the parking lot to gain access through the phone to the internal network. Thus if you do not have controls in place then your network is definitely at risk. 


Q123. Which of the following BEST describes the type of attack that is occurring? 

A. Smurf Attack 

B. Man in the middle 

C. Backdoor 

D. Replay 

E. Spear Phishing 

F. Xmas Attack 

G. Blue Jacking 

H. Ping of Death 

Answer:

Explanation: 

The exhibit shows that all the computers on the network are being ‘pinged’. This indicates that the ping request was sent to the network broadcast address. We can also see that all the replies were received by one (probably with a spoofed address) host on the network. This is typical of a smurf attack. 

A smurf attack is a type of network security breach in which a network connected to the Internet is swamped with replies to ICMP echo (PING) requests. A smurf attacker sends PING requests to an Internet broadcast address. These are special addresses that broadcast all received messages to the hosts connected to the subnet. Each broadcast address can support up to 255 hosts, so a single PING request can be multiplied 255 times. The return address of the request itself is spoofed to be the address of the attacker's victim. All the hosts receiving the PING request reply to this victim's address instead of the real sender's address. A single attacker sending hundreds or thousands of these PING messages per second can fill the victim's T-1 (or even T-3) line with ping replies, bring the entire Internet service to its knees. Smurfing falls under the general category of Denial of Service attacks -- security attacks that don't try to steal information, but instead attempt to disable a computer or network. 


Q124. Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks? 

A. Check the referrer field in the HTTP header 

B. Disable Flash content 

C. Use only cookies for authentication 

D. Use only HTTPS URLs 

Answer:

Explanation: 

XSRF or cross-site request forgery applies to web applications and is an attack that exploits the web application’s trust of a user who known or is supposed to have been authenticated. This is accomplished by changing values in the HTTP header and even in the user’s cookie to falsify access. It can be prevented by embedding additional authentication data into requests that allows the web application to detect requests from unauthorized locations. Examples are synchronizer token patterns, cookie-to-header tokens, and checking the HTTP Referrer header and the HTTP Origin header. 


Q125. What is a system that is intended or designed to be broken into by an attacker? 

A. Honeypot 

B. Honeybucket 

C. Decoy 

D. Spoofing system 

Answer:

Explanation: 

A honeypot is a system whose purpose it is to be attacked. An administrator can watch and study 

the attack to research current attack methodologies. 

According to the Wepopedia.com, a Honeypot luring a hacker into a system has several main 

purposes: 

The administrator can watch the hacker exploit the vulnerabilities of the system, thereby learning 

where the system has weaknesses that need to be redesigned. 

The hacker can be caught and stopped while trying to obtain root access to the system. 

By studying the activities of hackers, designers can better create more secure systems that are 

potentially invulnerable to future hackers. 

There are two main types of honeypots: 

Production - A production honeypot is one used within an organization's environment to help 

mitigate risk. 

Research – A research honeypot add value to research in computer security by providing a 

platform to study the threat. 


Latest SY0-401 free draindumps:

Q126. Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure? 

A. Hardware load balancing 

B. RAID 

C. A cold site 

D. A host standby 

Answer:

Explanation: 

Fault tolerance is the ability of a system to sustain operations in the event of a component failure. Fault-tolerant systems can continue operation even though a critical component, such as a disk drive, has failed. This capability involves overengineering systems by adding redundant components and subsystems. RAID can achieve fault tolerance using software which can be done using the existing hardware and software. 


Q127. Encryption used by RADIUS is BEST described as: 

A. Quantum 

B. Elliptical curve 

C. Asymmetric 

D. Symmetric 

Answer:

Explanation: 

The RADIUS server uses a symmetric encryption method. 

Note: Symmetric algorithms require both ends of an encrypted message to have the same key and 

processing algorithms. Symmetric algorithms generate a secret key that must be protected. 


Q128. Ann works at a small company and she is concerned that there is no oversight in the finance department; specifically, that Joe writes, signs and distributes paycheques, as well as other expenditures. Which of the following controls can she implement to address this concern? 

A. Mandatory vacations 

B. Time of day restrictions 

C. Least privilege 

D. Separation of duties 

Answer:

Explanation: 

Separation of duties divides administrator or privileged tasks into separate groupings, which in turn, is individually assigned to unique administrators. This helps in fraud prevention, error reduction, as well as conflict of interest prevention. For example, those who configure security should not be the same people who test security. In this case, Joe should not be allowed to write and sign paycheques. 


Q129. A security administrator looking through IDS logs notices the following entry: (where email=joe@joe.com and passwd= ‘or 1==1’) 

Which of the following attacks had the administrator discovered? 

A. SQL injection 

B. XML injection 

C. Cross-site script 

D. Header manipulation 

Answer:

Explanation: 

The code in the question is an example of a SQL Injection attack. The code ‘1==1’ will always provide a value of true. This can be included in statement designed to return all rows in a SQL table. 

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. 


Q130. Which of the following is an important step in the initial stages of deploying a host-based firewall? 

A. Selecting identification versus authentication 

B. Determining the list of exceptions 

C. Choosing an encryption algorithm 

D. Setting time of day restrictions 

Answer:

Explanation: 

A host-based firewall is installed on a client system and is used to protect the client system from the activities of the user as well as from communication from the network or Internet. These firewalls manage network traffic using filters to block certain ports and protocols while allowing others to pass through the system.