It is more faster and easier to pass the CompTIA sy0 401 dump exam by using Refined CompTIA CompTIA Security+ Certification questuins and answers. Immediate access to the Latest sy0 401 pdf Exam and find the same core area sy0 401 pdf questions with professionally verified answers, then PASS your exam with a high score now.

Q31. A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks. 

Which of the following is MOST likely the reason for the sub-interfaces? 

A. The network uses the subnet of 255.255.255.128. 

B. The switch has several VLANs configured on it. 

C. The sub-interfaces are configured for VoIP traffic. 

D. The sub-interfaces each implement quality of service. 

Answer:

Explanation: 

A subinterface is a division of one physical interface into multiple logical interfaces. Routers commonly employ subinterfaces for a variety of purposes, most common of these are for routing traffic between VLANs. Also, IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network. 


Q32. A CRL is comprised of. 

A. Malicious IP addresses. 

B. Trusted CA’s. 

C. Untrusted private keys. 

D. Public keys. 

Answer:

Explanation: 

A certificate revocation list (CRL) is created and distributed to all CAs to revoke a certificate or 

key. 

By checking the CRL you can check if a particular certificate has been revoked. 

The certificates for which a CRL should be maintained are often X.509/public key certificates, as 

this format is commonly used by PKI schemes. 


Q33. Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process? 

A. Separation of Duties 

B. Mandatory Vacations 

C. Discretionary Access Control 

D. Job Rotation 

Answer:

Explanation: 

Separation of duties means that users are granted only the permissions they need to do their work and no more. 


Q34. Which of the following has a storage root key? 

A. HSM 

B. EFS 

C. TPM 

D. TKIP 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates on non-volatile (NV) memory. Data stored on NV memory is retained unaltered when the device has no power. The storage root key is embedded in the TPM to protect TPM keys created by applications, so that these keys cannot be used without the TPM. 


Q35. Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue and still provide coverage where needed? (Select TWO). 

A. Disable the wired ports 

B. Use channels 1, 4 and 7 only 

C. Enable MAC filtering 

D. Disable SSID broadcast 

E. Switch from 802.11a to 802.11b 

Answer: C,D 

Explanation: Network administrators may choose to disable SSID broadcast to hide their network from unauthorized personnel. However, the SSID is still needed to direct packets to and from the base station, so it’s a discoverable value using a wireless packet sniffer. Thus, the SSID should be disabled if the network isn’t for public use. A MAC filter is a list of authorized wireless client interface MAC addresses that is used by a WAP to block access to all unauthorized devices. 


Q36. Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools? 

A. Identify user habits 

B. Disconnect system from network 

C. Capture system image 

D. Interview witnesses 

Answer:

Explanation: 

Capturing an image of the operating system in its exploited state can be helpful in revisiting the issue after the fact to learn more about it. Very much as helpful in same way that a virus sample is kept in laboratories to study later after a breakout. Also you should act in the order of volatility which states that the system image capture is first on the list of a forensic analysis. 


Q37. An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files should be copied from srv4 to accomplish this? 

A. certificate, private key, and intermediate certificate chain 

B. certificate, intermediate certificate chain, and root certificate 

C. certificate, root certificate, and certificate signing request 

D. certificate, public key, and certificate signing request 

Answer:

Explanation: 

a wildcard certificate is a public key certificate which can be used with multiple subdomains of a domain. In public-key cryptography, the receiver has a private key known only to them; a public key corresponds to it, which they make known to others. The public key can be sent to all other parties; the private key is never divulged. A symmetric algorithm requires that receivers of the message use the same private key. Thus you should copy the certificate, the private key and the intermediate certificate chain from srv4 to srv5. 


Q38. Human Resources suspect an employee is accessing the employee salary database. The administrator is asked to find out who it is. In order to complete this task, which of the following is a security control that should be in place? 

A. Shared accounts should be prohibited. 

B. Account lockout should be enabled 

C. Privileges should be assigned to groups rather than individuals 

D. Time of day restrictions should be in use 

Answer:

Explanation: 

Since distinguishing between the actions of one person and another isn’t possible if they both use a shared account, shared accounts should not be allowed. If shared accounts are being used, the administrator will find the account, but have more than one suspect. To nullify this occurrence, Shared accounts should be prohibited. 


Q39. Which of the following attacks targets high level executives to gain company information? 

A. Phishing 

B. Whaling 

C. Vishing 

D. Spoofing 

Answer:

Explanation: 

Whaling is a specific kind of malicious hacking within the more general category of phishing, which involves hunting for data that can be used by the hacker. In general, phishing efforts are focused on collecting personal data about users. In whaling, the targets are high-ranking bankers, executives or others in powerful positions or job titles. Hackers who engage in whaling often describe these efforts as "reeling in a big fish," applying a familiar metaphor to the process of scouring technologies for loopholes and opportunities for data theft. Those who are engaged in whaling may, for example, hack into specific networks where these powerful individuals work or store sensitive data. They may also set up keylogging or other malware on a work station associated with one of these executives. There are many ways that hackers can pursue whaling, leading C-level or top-level executives in business and government to stay vigilant about the possibility of cyber threats. 


Q40. Which device monitors network traffic in a passive manner? 

A. Sniffer 

B. IDS 

C. Firewall 

D. Web browser 

Answer:

Explanation: 

A sniffer is another name for a protocol analyzer. A protocol analyzer performs its function in a 

passive manner. In other words, computers on the network do not know that their data packets 

have been captured. 

A Protocol Analyzer is a hardware device or more commonly a software program used to capture 

network data communications sent between devices on a network. Capturing packets sent from a 

computer system is known as packet sniffing. 

Well known software protocol analyzers include Message Analyzer (formerly Network Monitor) 

from Microsoft and Wireshark (formerly Ethereal). 

A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If computers are 

connected to a local area network that is not filtered or switched, the traffic can be broadcast to all 

computers contained in the same segment. This doesn’t generally occur, since computers are 

generally told to ignore all the comings and goings of traffic from other computers. However, in the 

case of a sniffer, all traffic is shared when the sniffer software commands the Network Interface 

Card (NIC) to stop ignoring the traffic. The NIC is put into promiscuous mode, and it reads 

communications between computers within a particular segment. This allows the sniffer to seize everything that is flowing in the network, which can lead to the unauthorized access of sensitive data. A packet sniffer can take the form of either a hardware or software solution. A sniffer is also known as a packet analyzer.