It is impossible to pass CompTIA SY0-401 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed CompTIA SY0-401 practice questions. You will get a surprising result by our Down to date CompTIA Security+ Certification practice guides.

2021 Mar SY0-401 testing engine

Q571. Some customers have reported receiving an untrusted certificate warning when visiting the company’s website. The administrator ensures that the certificate is not expired and that customers have trusted the original issuer of the certificate. Which of the following could be causing the problem? 

A. The intermediate CA certificates were not installed on the server. 

B. The certificate is not the correct type for a virtual server. 

C. The encryption key used in the certificate is too short. 

D. The client’s browser is trying to negotiate SSL instead of TLS. 

Answer:

Explanation: 

In a hierarchical trust model, also known as a tree, a root CA at the top provides all of the information. The intermediate CAs are next in the hierarchy, and they trust only information provided by the root CA. The root CA also trusts intermediate CAs that are in their level in the hierarchy and none that aren’t. 


Q572. The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO). 

A. Device encryption 

B. Antivirus 

C. Privacy screen 

D. Cable locks 

E. Remote wipe 

Answer: B,D 

Explanation: 

B: Antivirus software is used to protect systems against viruses, which are a form of malicious code designed to spread from one system to another, consuming network resources. Public systems are particularly prone to viruses. 

D: Cable locks are theft deterrent devices that can be used to tether a device to a fixed point keep devices from being easy to steal. 


Q573. The security manager wants to unify the storage of credential, phone numbers, office numbers, and address information into one system. Which of the following is a system that will support the requirement on its own? 

A. LDAP 

B. SAML 

C. TACACS 

D. RADIUS 

Answer:

Explanation: 


Q574. Which of the following provides the BEST explanation regarding why an organization needs to implement IT security policies? 

A. To ensure that false positives are identified 

B. To ensure that staff conform to the policy 

C. To reduce the organizational risk 

D. To require acceptable usage of IT systems 

Answer:

Explanation: 

Once risks has been identified and assessed then there are five possible actions that should be taken. These are: Risk avoidance, Risk transference, Risk mitigation, Risk deterrence and Risk acceptance. Anytime you engage in steps to reduce risk, you are busy with risk mitigation and implementing IT security policy is a risk mitigation strategy. 


Q575. Which of the following security concepts identifies input variables which are then used to perform boundary testing? 

A. Application baseline 

B. Application hardening 

C. Secure coding 

D. Fuzzing 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Latest SY0-401 exam question:

Q576. A company wants to ensure that all credentials for various systems are saved within a central database so that users only have to login once for access to all systems. Which of the following would accomplish this? 

A. Multi-factor authentication 

B. Smart card access 

C. Same Sign-On 

D. Single Sign-On 

Answer:

Explanation: 

Single sign-on means that once a user (or other subject) is authenticated into a realm, re-authentication is not required for access to resources on any realm entity. Single sign-on is able to internally translate and store credentials for the various mechanisms, from the credential used for original authentication. 


Q577. Which of the following attacks involves the use of previously captured network traffic? 

A. Replay 

B. Smurf 

C. Vishing 

D. DDoS 

Answer:

Explanation: 


Q578. Pete, the system administrator, has blocked users from accessing social media web sites. In addition to protecting company information from being accidentally leaked, which additional security benefit does this provide? 

A. No competition with the company’s official social presence 

B. Protection against malware introduced by banner ads 

C. Increased user productivity based upon fewer distractions 

D. Elimination of risks caused by unauthorized P2P file sharing 

Answer:

Explanation: 

Banner, or header information messages sent with data to find out about the system(s) does happen. Banners often identify the host, the operating system running on it, and other information that can be useful if you are going to attempt to later breach the security of it. 


Q579. Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses? 

A. Penetration test 

B. Code review 

C. Vulnerability scan 

D. Brute Force scan 

Answer:

Explanation: 

A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Internet in order to assess the threat of rogue software or malicious employees in an enterprise. 


Q580. Which of the following pseudocodes can be used to handle program exceptions? 

A. If program detects another instance of itself, then kill program instance. 

B. If user enters invalid input, then restart program. 

C. If program module crashes, then restart program module. 

D. If user’s input exceeds buffer length, then truncate the input. 

Answer:

Explanation: 

Exception handling is an aspect of secure coding. When errors occur, the system should revert back to a secure state. This must be coded into the system by the programmer, and should capture all errors and exceptions that could cause the application or its modules to crash. Restarting the application or module would ensure that the application reverts back to a secure state.