It is impossible to pass CompTIA SY0-401 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed CompTIA SY0-401 practice questions. You will get a surprising result by our Avant-garde CompTIA Security+ Certification practice guides.

2021 Mar SY0-401 test engine

Q501. Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware? 

A. Logic bomb 

B. Worm 

C. Trojan 

D. Adware 

Answer:

Explanation: 

In computers, a Trojan is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. 


Q502. Which of the following protocols is used to authenticate the client and server’s digital certificate? 

A. PEAP 

B. DNS 

C. TLS 

D. ICMP 

Answer:

Explanation: 

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom it is communicating, and to exchange a symmetric key. 


Q503. Which of the following is the LEAST volatile when performing incident response procedures? 

A. Registers 

B. RAID cache 

C. RAM 

D. Hard drive 

Answer:

Explanation: 

An example of OOV in an investigation may be RAM, hard drive data, CDs/DVDs, and printouts. Of the options stated in the question the hard drive would be the least volatile. 


Q504. To protect corporate data on removable media, a security policy should mandate that all removable devices use which of the following? 

A. Full disk encryption 

B. Application isolation 

C. Digital rights management 

D. Data execution prevention 

Answer:

Explanation: 

Full-disk encryption encrypts the data on the hard drive of the device or on a removable drive. This feature ensures that the data on the device or removable drive cannot be accessed in a useable form should it be stolen. 


Q505. An administrator needs to segment internal traffic between layer 2 devices within the LAN. Which of the following types of network design elements would MOST likely be used? 

A. Routing 

B. DMZ 

C. VLAN 

D. NAT 

Answer:

Explanation: 

A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function. 


Down to date SY0-401 test preparation:

Q506. Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department’s server, and the accounting department should not have access to the HR department’s server. The network is separated by switches. Which of the following is designed to keep the HR department users from accessing the accounting department’s server and vice-versa? 

A. ACLs 

B. VLANs 

C. DMZs 

D. NATS 

Answer:

Explanation: 

A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function. 


Q507. Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign the file? 

A. Joe’s public key 

B. Joe’s private key 

C. Ann’s public key 

D. Ann’s private key 

Answer:

Explanation: 

The sender uses his private key, in this case Ann's private key, to create a digital signature. The message is, in effect, signed with the private key. The sender then sends the message to the receiver. The receiver uses the public key attached to the message to validate the digital signature. If the values match, the receiver knows the message is authentic. The receiver uses a key provided by the sender—the public key—to decrypt the message. Most digital signature implementations also use a hash to verify that the message has not been altered, intentionally or accidently, in transit. 


Q508. Which of the following would be MOST appropriate to secure an existing SCADA system by preventing connections from unauthorized networks? 

A. Implement a HIDS to protect the SCADA system 

B. Implement a Layer 2 switch to access the SCADA system 

C. Implement a firewall to protect the SCADA system 

D. Implement a NIDS to protect the SCADA system 

Answer:

Explanation: 


Q509. Pete, a security engineer, is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally, the MAC addresses of all five servers appear on the same switch port. Which of the following is MOST likely the cause? 

A. The system is running 802.1x. 

B. The system is using NAC. 

C. The system is in active-standby mode. 

D. The system is virtualized. 

Answer:

Explanation: 

Virtualization allows a single set of hardware to host multiple virtual machines. 


Q510. Which of the following is the below pseudo-code an example of? 

IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT 

A. Buffer overflow prevention 

B. Input validation 

C. CSRF prevention 

D. Cross-site scripting prevention 

Answer:

Explanation: 

Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain.