Acquiring CompTIA CompTIA certification is really a hard activity by on your own. The CompTIA SY0-401 exam genuine exam will get some modifications, and the CompTIA SY0-401 practice questions and answers may make several modifications accordingly. The CompTIA SY0-401 test will be an important section of CompTIA CompTIA certification exam. Testking offers abundant resources for you to put together the CompTIA SY0-401 exam. The CompTIA SY0-401 certificate is a threshold towards the IT discipline.

2021 Apr SY0-401 test

Q271. How often, at a MINIMUM, should Sara, an administrator, review the accesses and rights of the users on her system? 

A. Annually 

B. Immediately after an employee is terminated 

C. Every five years 

D. Every time they patch the server 

Answer:

Explanation: 

Reviewing the accesses and rights of the users on a system at least annually is acceptable practice. More frequently would be desirable but too frequently would be a waste of administrative time. 


Q272. Ann an employee is visiting Joe, an employee in the Human Resources Department. While talking to Joe, Ann notices a spreadsheet open on Joe’s computer that lists the salaries of all employees in her department. Which of the following forms of social engineering would BEST describe this situation? 

A. Impersonation 

B. Dumpster diving 

C. Tailgating 

D. Shoulder surfing 

Answer:

Explanation: 

Ann was able to see the Spreadsheet on Joe’s computer. This direct observation is known as shoulder surfing. 

Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is an effective way to get information in crowded places because it's relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done long distance with the aid of binoculars or other vision-enhancing devices. To prevent shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand. 


Q273. Which of the following is a penetration testing method? 

A. Searching the WHOIS database for administrator contact information 

B. Running a port scanner against the target's network 

C. War driving from a target's parking lot to footprint the wireless network 

D. Calling the target's helpdesk, requesting a password reset 

Answer:

Explanation: 


Q274. DRAG DROP 

Drag and drop the correct protocol to its default port. 

Answer: 

Explanation: 

FTP uses TCP port 21. 

Telnet uses port 23. 

SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, 

and slogin, also use TCP port 22. Secure Copy Protocol (SCP) is a secure file-transfer facility 

based on SSH and Remote Copy Protocol (RCP). Secure FTP (SFTP) is a secured alternative to 

standard File Transfer Protocol (FTP). 

SMTP uses TCP port 25. 

Port 69 is used by TFTP. 

SNMP makes use of UDP ports 161 and 162. 

References: 

Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp 42, 45, 

http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers 


Q275. The concept of rendering data passing between two points over an IP based network impervious to all but the most sophisticated advanced persistent threats is BEST categorized as which of the following? 

A. Stream ciphers 

B. Transport encryption 

C. Key escrow 

D. Block ciphers 

Answer:

Explanation: 

Transport encryption is the process of encrypting data ready to be transmitted over an insecure network. A common example of this would be online banking or online purchases where sensitive information such as account numbers or credit card numbers is transmitted. 

Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL). 


Update SY0-401 exam guide:

Q276. CORRECT TEXT 

Answer: Use the following answer for this simulation task. 

Explanation: 

Firewall rules act like ACLs, and they are used to dictate what traffic can pass between the firewall and the internal network. Three possible actions can be taken based on the rule’s criteria: Block the connection Allow the connection Allow the connection only if it is secured 

TCP is responsible for providing a reliable, one-to-one, connection-oriented session. TCP establishes a connection and ensures that the other end receives any packets sent. Two hosts communicate packet results with each other. TCP also ensures that packets are decoded and sequenced properly. This connection is persistent during the session. When the session ends, the connection is torn down. UDP provides an unreliable connectionless communication method between hosts. UDP is considered a best-effort protocol, but it’s considerably faster than TCP. The sessions don’t establish a synchronized session like the kind used in TCP, and UDP doesn’t guarantee error-free communications. The primary purpose of UDP is to send small packets of information. The application is responsible for acknowledging the correct reception of the data. Port 22 is used by both SSH and SCP with UDP. Port 443 is used for secure web connections – HTTPS and is a TCP port. Thus to make sure only the Accounting computer has HTTPS access to the Administrative server you should use TCP port 443 and set the rule to allow communication between 10.4.255.10/24 (Accounting) and 10.4.255.101 (Administrative server1) Thus to make sure that only the HR computer has access to Server2 over SCP you need use of TCP port 22 and set the rule to allow communication between 10.4.255.10/23 (HR) and 10.4.255.2 (server2) Thus to make sure that the IT computer can access both the Administrative servers you need to use a port and accompanying port number and set the rule to allow communication between: 

10.4.255.10.25 (IT computer) and 10.4.255.101 (Administrative server1) 10.4.255.10.25 (IT computer) and 10.4.255.102 (Administrative server2) 

References: 

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, 

Indianapolis, 2014, pp 77, 83, 96, 157. 


Q277. Sara, a security engineer, is testing encryption ciphers for performance. Which of the following ciphers offers strong encryption with the FASTEST speed? 

A. 3DES 

B. Blowfish 

C. Serpent 

D. AES256 

Answer:

Explanation: 

Blowfish is an encryption system invented by a team led by Bruce Schneier that performs a 64-bit block cipher at very fast speeds. Blowfish is a fast, except when changing keys. It is a symmetric block cipher that can use variable-length keys (from 32 bits to 448 bits). 


Q278. A security analyst is reviewing firewall logs while investigating a compromised web server. The following ports appear in the log: 

22, 25, 445, 1433, 3128, 3389, 6667 

Which of the following protocols was used to access the server remotely? 

A. LDAP 

B. HTTP 

C. RDP 

D. HTTPS 

Answer:

Explanation: 

RDP uses TCP port 3389. 


Q279. Which of the following results in datacenters with failed humidity controls? (Select TWO). 

A. Excessive EMI 

B. Electrostatic charge 

C. Improper ventilation 

D. Condensation 

E. Irregular temperature 

Answer: B,D 

Explanation: 

Humidity control prevents the buildup of static electricity in the environment. If the humidity drops much below 50 percent, electronic components are extremely vulnerable to damage from electrostatic shock. Most environmental systems also regulate humidity; however, a malfunctioning system can cause the humidity to be almost entirely extracted from a room. Make sure that environmental systems are regularly serviced. Electrostatic damage can occur when humidity levels get too low. Condensation is a direct result from failed humidity levels. 


Q280. A system administrator wants to confidentially send a user name and password list to an individual outside the company without the information being detected by security controls. Which of the following would BEST meet this security goal? 

A. Digital signatures 

B. Hashing 

C. Full-disk encryption 

D. Steganography 

Answer:

Explanation: