Download of SY0-401 test materials and cram for CompTIA certification for IT candidates, Real Success Guaranteed with Updated SY0-401 pdf dumps vce Materials. 100% PASS CompTIA Security+ Certification exam Today!

2021 Mar SY0-401 study guide

Q651. Which of the following protocols is MOST likely to be leveraged by users who need additional information about another user? 

A. LDAP 

B. RADIUS 

C. Kerberos 

D. TACACS+ 

Answer:

Explanation: 


Q652. The practice of marking open wireless access points is called which of the following? 

A. War dialing 

B. War chalking 

C. War driving 

D. Evil twin 

Answer:

Explanation: 

War chalking is the act of making chalk marks on outdoor surfaces (walls, sidewalks, buildings, sign posts, trees) to indicate the existence of an open wireless network connection, usually offering an Internet connection so that others can benefit from the free wireless access. The open connections typically come from the access points of wireless networks located within buildings to serve enterprises. The chalk symbols indicate the type of access point that is available at that specific spot. 


Q653. Which of the following uses port 22 by default? (Select THREE). 

A. SSH 

B. SSL 

C. TLS 

D. SFTP 

E. SCP 

F. FTPS 

G. SMTP 

H. SNMP 

Answer: A,D,E 

Explanation: 

SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22. 


Q654. The systems administrator wishes to implement a hardware-based encryption method that could also be used to sign code. They can achieve this by: 

A. Utilizing the already present TPM. 

B. Configuring secure application sandboxes. 

C. Enforcing whole disk encryption. 

D. Moving data and applications into the cloud. 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Q655. Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall? 

A. TCP 23 

B. UDP 69 

C. TCP 22 

D. TCP 21 

Answer:

Explanation: 

SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22. Secure Copy Protocol (SCP) is a secure file-transfer facility based on SSH and Remote Copy Protocol (RCP). Secure FTP (SFTP) is a secured alternative to standard File Transfer Protocol (FTP). 


Abreast of the times SY0-401 exam question:

Q656. Computer evidence at a crime is preserved by making an exact copy of the hard disk. Which of the following does this illustrate? 

A. Taking screenshots 

B. System image capture 

C. Chain of custody 

D. Order of volatility 

Answer:

Explanation: 

A system image would be a snapshot of what exists at the moment. Thus capturing an image of the operating system in its exploited state can be helpful in revisiting the issue after the fact to learn more about it. 


Q657. A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected? 

A. Block cipher 

B. Stream cipher 

C. CRC 

D. Hashing algorithm 

Answer:

Explanation: 

With a block cipher the algorithm works on chunks of data—encrypting one and then moving to the 

next. 

Example: Blowfish is an encryption system that performs a 64-bit block cipher at very fast speeds. 


Q658. Which of the following may cause Jane, the security administrator, to seek an ACL work around? 

A. Zero day exploit 

B. Dumpster diving 

C. Virus outbreak 

D. Tailgating 

Answer:

Explanation: 

A zero day vulnerability is an unknown vulnerability so there is no fix or patch for it. One way to attempt to work around a zero day vulnerability would be to restrict the permissions by using an ACL (Access Control List) A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. 


Q659. Which of the following BEST describes part of the PKI process? 

A. User1 decrypts data with User2’s private key 

B. User1 hashes data with User2’s public key 

C. User1 hashes data with User2’s private key 

D. User1 encrypts data with User2’s public key 

Answer:

Explanation: 

In a PKI the sender encrypts the data using the receiver's public key. The receiver decrypts the 

data using his own private key. 

PKI is a two-key, asymmetric system with four main components: certificate authority (CA), 

registration authority (RA), RSA (the encryption algorithm), and digital certificates. Messages are 

encrypted with a public key and decrypted with a private key. 

A PKI example: 

1.

 You want to send an encrypted message to Jordan, so you request his public key. 

2.

 Jordan responds by sending you that key. 

3.

 You use the public key he sends you to encrypt the message. 

4.

 You send the message to him. 

5.

 Jordan uses his private key to decrypt the message. 


Q660. In the case of a major outage or business interruption, the security office has documented the expected loss of earnings, potential fines and potential consequence to customer service. Which of the following would include the MOST detail on these objectives? 

A. Business Impact Analysis 

B. IT Contingency Plan 

C. Disaster Recovery Plan 

D. Continuity of Operations 

Answer:

Explanation: 

Business impact analysis (BIA) is the process of evaluating all of the critical systems in an organization to define impact and recovery plans. BIA isn’t concerned with external threats or vulnerabilities; the analysis focuses on the impact a loss would have on the organization. A BIA comprises the following: identifying critical functions, prioritizing critical business functions, calculating a timeframe for critical systems loss, and estimating the tangible impact on the organization.