Pinpoint of sy0 401 practice test practice exam materials and testing bible for CompTIA certification for client, Real Success Guaranteed with Updated comptia security+ sy0 401 pdf dumps vce Materials. 100% PASS CompTIA Security+ Certification exam Today!

Q181. After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation? 

A. Information Security Awareness 

B. Social Media and BYOD 

C. Data Handling and Disposal 

D. Acceptable Use of IT Systems 

Answer:

Explanation: 

Education and training with regard to Information Security Awareness will reduce the risk of data leaks and as such forms an integral part of Security Awareness. By employing social engineering data can be leaked by employees and only when company users are made aware of the methods of social engineering via Information Security Awareness Training, you can reduce the risk of data leaks. 


Q182. Which of the following technical controls is BEST used to define which applications a user can install and run on a company issued mobile device? 

A. Authentication 

B. Blacklisting 

C. Whitelisting 

D. Acceptable use policy 

Answer:

Explanation: 

White lists are closely related to ACLs and essentially, a white list is a list of items that are allowed. 


Q183. When Ann an employee returns to work and logs into her workstation she notices that, several desktop configuration settings have changed. Upon a review of the CCTV logs, it is determined that someone logged into Ann’s workstation. Which of the following could have prevented this from happening? 

A. Password complexity policy 

B. User access reviews 

C. Shared account prohibition policy 

D. User assigned permissions policy 

Answer:

Explanation: 

The most important countermeasure against password crackers is to use long, complex passwords, which are changed regularly. Since changes were made to Ann’s desktop configuration settings while she was not at work, means that her password was compromised. 


Q184. An internal auditing team would like to strengthen the password policy to support special characters. Which of the following types of password controls would achieve this goal? 

A. Add reverse encryption 

B. Password complexity 

C. Increase password length 

D. Allow single sign on 

Answer:

Explanation: 

Generally, the minimum password length is considered to be 8 upper and lowercase characters. The use of at least one non-alpha character like punctuation, special characters, or numbers, combined with the password length produces strong passwords. Strong passwords are produced by the combination of a password’s length and complexity. 


Q185. An online store wants to protect user credentials and credit card information so that customers can store their credit card information and use their card for multiple separate transactions. 

Which of the following database designs provides the BEST security for the online store? 

A. Use encryption for the credential fields and hash the credit card field 

B. Encrypt the username and hash the password 

C. Hash the credential fields and use encryption for the credit card field 

D. Hash both the credential fields and the credit card field 

Answer:

Explanation: 

Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash tables. One main characteristic of hashing is that the algorithm must have few or no collisions – in hashing two different inputs does not give the same output. Thus the credential fields should be hashed because anyone customer will have a unique credit card number/identity and since they will use their credit cards for many different transactions, the credit card field should be encrypted only, not hashed. 


Q186. A security engineer is given new application extensions each month that need to be secured prior to implementation. They do not want the new extensions to invalidate or interfere with existing application security. Additionally, the engineer wants to ensure that the new requirements are approved by the appropriate personnel. Which of the following should be in place to meet these two goals? (Select TWO). 

A. Patch Audit Policy 

B. Change Control Policy 

C. Incident Management Policy 

D. Regression Testing Policy 

E. Escalation Policy 

F. Application Audit Policy 

Answer: B,D 

Explanation: 

A backout (regression testing) is a reversion from a change that had negative consequences. It could be, for example, that everything was working fi ne until you installed a service pack on a production machine, and then services that were normally available were no longer accessible. The backout, in this instance, would revert the system to the state that it was in before the service pack was applied. Backout plans can include uninstalling service packs, hotfi xes, and patches, but they can also include reversing a migration and using previous firmware. A key component to creating such a plan is identifying what events will trigger your implementing the backout. A change control policy refers to the structured approach that is followed to secure a company’s assets in the event of changes occurring. 


Q187. One of the system administrators at a company is assigned to maintain a secure computer lab. The administrator has rights to configure machines, install software, and perform user account maintenance. However, the administrator cannot add new computers to the domain, because that requires authorization from the Information Assurance Officer. This is an example of which of the following? 

A. Mandatory access 

B. Rule-based access control 

C. Least privilege 

D. Job rotation 

Answer:

Explanation: 

A least privilege policy should be used when assigning permissions. Give users only the permissions that they need to do their work and no more. 


Q188. When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com. Which of the following BEST describes this type of record? 

A. DNSSEC record 

B. IPv4 DNS record 

C. IPSEC DNS record 

D. IPv6 DNS record 

Answer:

Explanation: The AAAA Address record links a FQDN to an IPv6 address. 


Q189. Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks? 

A. Intrusion Detection System 

B. Flood Guard Protection 

C. Web Application Firewall 

D. URL Content Filter 

Answer:

Explanation: 

Cross-site scripting (XSS) is a form of malicious code-injection attack on a web server in which an attacker injects code into the content sent to website visitors. XSS can be mitigated by implementing patch management on the web server, using firewalls, and auditing for suspicious activity. 


Q190. A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389 are in a `listening’ state. No other ports are open. Which of the following services should be disabled to ensure secure communications? 

A. HTTPS 

B. HTTP 

C. RDP 

D. TELNET 

Answer:

Explanation: 

HTTP uses port 80. HTTP does not provide encrypted communications. Port 443 is used by HTTPS which provides secure encrypted communications. Port 3389 is used by RDP (Remote Desktop Protocol) which does provide encrypted communications.