CompTIA Security+ Certification Quiz Amount: SY0-401
Tied in Qualification: CompTIA
Obtainable Different languages: Language, Nippon, Chinese language, Spanish, European, Vietnamese, Dutch, Portuguese
Quiz Identity : CompTIA Security+ Certification
Answers and questions : [productnum] Q&As
Update Time frame: [productupdatetime]
Price: [productprice]

2021 Feb SY0-401 exam engine

Q21. A system administrator attempts to ping a hostname and the response is 2001:4860:0:2001::68. 

Which of the following replies has the administrator received? 

A. The loopback address 

B. The local MAC address 

C. IPv4 address 

D. IPv6 address 

Answer:

Explanation: 

IPv6 addresses are 128-bits in length. An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). The hexadecimal digits are case-insensitive, but IETF recommendations suggest the use of lower case letters. The full representation of eight 4-digit groups may be simplified by several techniques, eliminating parts of the representation. 


Q22. When a communications plan is developed for disaster recovery and business continuity plans, the MOST relevant items to include would be: (Select TWO). 

A. Methods and templates to respond to press requests, institutional and regulatory reporting requirements. 

B. Methods to exchange essential information to and from all response team members, employees, suppliers, and customers. 

C. Developed recovery strategies, test plans, post-test evaluation and update processes. 

D. Defined scenarios by type and scope of impact and dependencies, with quantification of loss potential. 

E. Methods to review and report on system logs, incident response, and incident handling. 

Answer: A,B 

Explanation: 

A: External emergency communications that should fit into your business continuity plan include notifying family members of an injury or death, discussing the disaster with the media, and providing status information to key clients and stakeholders. Each message needs to be prepared with the audience (e.g., employees, media, families, government regulators) in mind; broad general announcements may be acceptable in the initial aftermath of an incident, but these will need to be tailored to the audiences in subsequent releases. 

B: A typical emergency communications plan should be extensive in detail and properly planned by a business continuity planner. Internal alerts are sent using either email, overhead building paging systems, voice messages or text messages to cell/smartphones with instructions to evacuate the building and relocate at assembly points, updates on the status of the situation, and notification of when it's safe to return to work. 


Q23. Which of the following protocols provides transport security for virtual terminal emulation? 

A. TLS 

B. SSH 

C. SCP 

D. S/MIME 

Answer:

Explanation: 

Secure Shell (SSH) is a tunneling protocol originally designed for Unix systems. It uses encryption to establish a secure connection between two systems. SSH also provides alternative, security-equivalent programs for such Unix standards as Telnet, FTP, and many other communications-oriented applications. SSH is available for use on Windows systems as well. This makes it the preferred method of security for Telnet and other cleartext oriented programs in the Unix environment. 


Q24. Which of the following is a measure of biometrics performance which rates the ability of a system to correctly authenticate an authorized user? 

A. Failure to capture 

B. Type II 

C. Mean time to register 

D. Template capacity 

Answer:

Explanation: 

Type II, or false acceptance rate (FAR), is the measure of the likelihood that the biometric security system will incorrectly accept an access attempt by an unauthorized user. 


Q25. Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session? 

A. SFTP 

B. HTTPS 

C. TFTP 

D. TLS 

Answer:

Explanation: 

SSL establishes a session using asymmetric encryption and maintains the session using symmetric encryption. 


Renewal SY0-401 testing engine:

Q26. The IT department has installed new wireless access points but discovers that the signal extends far into the parking lot. Which of the following actions should be taken to correct this? 

A. Disable the SSID broadcasting 

B. Configure the access points so that MAC filtering is not used 

C. Implement WEP encryption on the access points 

D. Lower the power for office coverage only 

Answer:

Explanation: 

On the chance that the signal is actually traveling too far, some access points include power level controls, which allow you to reduce the amount of output provided. 


Q27. A team of firewall administrators have access to a `master password list’ containing service account passwords. Which of the following BEST protects the master password list? 

A. File encryption 

B. Password hashing 

C. USB encryption 

D. Full disk encryption 

Answer:

Explanation: 

File encryption can be used to protect the contents of individual files. It uses randomly generated symmetric encryption keys for the file and stores the key in an encrypted form using the user’s public key on the encrypted file. 


Q28. Ann was reviewing her company's event logs and observed several instances of GUEST accessing the company print server, file server, and archive database. As she continued to investigate, Ann noticed that it seemed to happen at random intervals throughout the day, but mostly after the weekly automated patching and often logging in at the same time. Which of the following would BEST mitigate this issue? 

A. Enabling time of day restrictions 

B. Disabling unnecessary services 

C. Disabling unnecessary accounts 

D. Rogue machine detection 

Answer:

Explanation: 


Q29. An internal audit has detected that a number of archived tapes are missing from secured storage. There was no recent need for restoration of data from the missing tapes. The location is monitored by access control and CCTV systems. Review of the CCTV system indicates that it has not been recording for three months. The access control system shows numerous valid entries into the storage location during that time. The last audit was six months ago and the tapes were accounted for at that time. Which of the following could have aided the investigation? 

A. Testing controls 

B. Risk assessment 

C. Signed AUP 

D. Routine audits 

Answer:

Explanation: 


Q30. Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server? 

A. SSLv2 

B. SSHv1 

C. RSA 

D. TLS 

Answer:

Explanation: 

HTTP Secure HTTP Secure (HTTPS) is the protocol used for “secure” web pages that users should see when they must enter personal information such as credit card numbers, passwords, and other identifiers. It combines HTTP with SSL/TLS to provide encrypted communication. Transport Layer Security (TLS) is a security protocol that expands upon SSL. Many industry analysts predict that TLS will replace SSL, and it is also referred to as SSL 3.1.