Simulation of comptia security+ study guide sy0 401 simulations materials and training tools for CompTIA certification for customers, Real Success Guaranteed with Updated comptia security+ sy0 401 pdf dumps vce Materials. 100% PASS CompTIA Security+ Certification exam Today!

Q141. A security administrator would like to ensure that system administrators are not using the same password for both their privileged and non-privileged accounts. Which of the following security controls BEST accomplishes this goal? 

A. Require different account passwords through a policy 

B. Require shorter password expiration for non-privileged accounts 

C. Require shorter password expiration for privileged accounts 

D. Require a greater password length for privileged accounts 

Answer:

Explanation: 


Q142. Methods to test the responses of software and web applications to unusual or unexpected inputs are known as: 

A. Brute force. 

B. HTML encoding. 

C. Web crawling. 

D. Fuzzing. 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Q143. Which of the following is a best practice when securing a switch from physical access? 

A. Disable unnecessary accounts 

B. Print baseline configuration 

C. Enable access lists 

D. Disable unused ports 

Answer:

Explanation: 

Disabling unused switch ports a simple method many network administrators use to help secure their network from unauthorized access. 

All ports not in use should be disabled. Otherwise, they present an open door for an attacker to enter. 


Q144. Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO). 

A. 10.4.4.125 

B. 10.4.4.158 

C. 10.4.4.165 

D. 10.4.4.189 

E. 10.4.4.199 

Answer: C,D 

Explanation: 

With the given subnet mask, a maximum number of 30 hosts between IP addresses 10.4.4.161 and 10.4.4.190 are allowed. Therefore, option C and D would be hosts on the same subnet, and the other options would not. 

References: http://www.subnetonline.com/pages/subnet-calculators/ip-subnet-calculator.php 


Q145. Mandatory vacations are a security control which can be used to uncover which of the following? 

A. Fraud committed by a system administrator 

B. Poor password security among users 

C. The need for additional security staff 

D. Software vulnerabilities in vendor code 

Answer:

Explanation: 

Mandatory vacations also provide an opportunity to discover fraud apart from the obvious benefits of giving employees a chance to refresh and making sure that others in the company can fill those positions and make the company less dependent on those persons; a sort pf replication and duplication at all levels. 


Q146. An email client says a digital signature is invalid and the sender cannot be verified. The recipient is concerned with which of the following concepts? 

A. Integrity 

B. Availability 

C. Confidentiality 

D. Remediation 

Answer:

Explanation: 

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. The message is encrypted using the encryption system, and a second piece of information, the digital signature, is added to the message. Digital Signatures is used to validate the integrity of the message and the sender. Integrity means the message can’t be altered without detection. 


Q147. Pete, the system administrator, wishes to monitor and limit users’ access to external websites. 

Which of the following would BEST address this? 

A. Block all traffic on port 80. 

B. Implement NIDS. 

C. Use server load balancers. 

D. Install a proxy server. 

Answer:

Explanation: 

A proxy is a device that acts on behalf of other(s). In the interest of security, all internal user interaction with the Internet should be controlled through a proxy server. The proxy server should automatically block known malicious sites. The proxy server should cache often-accessed sites to improve performance. 


Q148. Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability? 

A. Twofish 

B. Diffie-Hellman 

C. ECC 

D. RSA 

Answer:

Explanation: 

Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography (with plain Galois fields as a basis) is the same level of security provided by keys of smaller size. 


Q149. After running into the data center with a vehicle, attackers were able to enter through the hole in the building and steal several key servers in the ensuing chaos. Which of the following security measures can be put in place to mitigate the issue from occurring in the future? 

A. Fencing 

B. Proximity readers 

C. Video surveillance 

D. Bollards 

Answer:

Explanation: 

To stop someone from entering a facility, barricades or gauntlets can be used. These are often used in conjunction with guards, fencing, and other physical security measures. Bollards are physical barriers that are strong enough to withstand impact with a vehicle. 


Q150. One of the servers on the network stops responding due to lack of available memory. Server administrators did not have a clear definition of what action should have taken place based on the available memory. Which of the following would have BEST kept this incident from occurring? 

A. Set up a protocol analyzer 

B. Set up a performance baseline 

C. Review the systems monitor on a monthly basis 

D. Review the performance monitor on a monthly basis 

Answer:

Explanation: 

A performance baseline provides the input needed to design, implement, and support a secure network. The performance baseline would define the actions that should be performed on a server that is running low on memory.