It is more faster and easier to pass the CompTIA security+ sy0 401 exam by using Virtual CompTIA CompTIA Security+ Certification questuins and answers. Immediate access to the Update comptia security+ get certified get ahead sy0 401 study guide Exam and find the same core area comptia security+ study guide sy0 401 questions with professionally verified answers, then PASS your exam with a high score now.

Q471. A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has experienced several laptop thefts from the cafe during peak shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate laptop theft. Which of the following would provide the IT department with the BEST solution? 

A. Attach cable locks to each laptop 

B. Require each customer to sign an AUP 

C. Install a GPS tracking device onto each laptop 

D. Install security cameras within the perimeter of the café 

Answer:

Explanation: 

All laptop cases include a built-in security slot in which a cable lock can be inserted to prevent it from easily being removed from the premises. 

Topic 3, Threats and Vulnerabilities 


Q472. Which of the following will help prevent smurf attacks? 

A. Allowing necessary UDP packets in and out of the network 

B. Disabling directed broadcast on border routers 

C. Disabling unused services on the gateway firewall 

D. Flash the BIOS with the latest firmware 

Answer:

Explanation: 


Q473. The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future? 

A. Job rotation 

B. Separation of duties 

C. Mandatory Vacations 

D. Least Privilege 

Answer:

Explanation: 

Separation of duties means that users are granted only the permissions they need to do their work and no more. More so it means that you are employing best practices. The segregation of duties and separation of environments is a way to reduce the likelihood of misuse of systems or information. A separation of duties policy is designed to reduce the risk of fraud and to prevent other losses in an organization. 


Q474. A security administrator is tasked with calculating the total ALE on servers. In a two year period of time, a company has to replace five servers. Each server replacement has cost the company $4,000 with downtime costing $3,000. Which of the following is the ALE for the company? 

A. $7,000 

B. $10,000 

C. $17,500 

D. $35,000 

Answer:

Explanation: 

SLE × ARO = ALE, where SLE is equal to asset value (AV) times exposure factor (EF); and ARO is the annualized rate of occurrence. SLE =($4000 + $3000) x 5 = $35000 ARO = 2 years Thus per year it would be 50% = 0,5 The ALE is thus $35000 x 0.5 = $17500 


Q475. A security technician needs to open ports on a firewall to allow for domain name resolution. 

Which of the following ports should be opened? (Select TWO). 

A. TCP 21 

B. TCP 23 

C. TCP 53 

D. UDP 23 

E. UDP 53 

Answer: C,E 

Explanation: 

DNS uses TCP and UDP port 53. TCP port 53 is used for zone transfers, whereas UDP port 53 is used for queries. 


Q476. Which of the following is the MOST important step for preserving evidence during forensic procedures? 

A. Involve law enforcement 

B. Chain of custody 

C. Record the time of the incident 

D. Report within one hour of discovery 

Answer:

Explanation: 

Chain of custody deals with how evidence is secured, where it is stored, and who has access to it. 

When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. The evidence must always be within your custody, or you’re open to dispute about possible evidence tampering. Thus to preserve evidence during a forensic procedure the chain of custody is of utmost importance. 


Q477. Which of the following would Pete, a security administrator, do to limit a wireless signal from penetrating the exterior walls? 

A. Implement TKIP encryption 

B. Consider antenna placement 

C. Disable the SSID broadcast 

D. Disable WPA 

Answer:

Explanation: Cinderblock walls, metal cabinets, and other barriers can reduce signal strength significantly. Therefore, antenna placement is critical. 


Q478. A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration. Which of the following should be implemented to secure the devices without risking availability? 

A. Host-based firewall 

B. IDS 

C. IPS 

D. Honeypot 

Answer:

Explanation: 


Q479. An administrator is building a development environment and requests that three virtual servers are cloned and placed in a new virtual network isolated from the production network. Which of the following describes the environment the administrator is building? 

A. Cloud 

B. Trusted 

C. Sandbox 

D. Snapshot 

Answer:

Explanation: 

Sandboxing is the process of isolating a system before installing new applications on it so as to restrict any potential malware that may be embedded in the new application from being able to cause harm to production systems. 


Q480. A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on which of the following? 

A. Peer to Peer 

B. Mobile devices 

C. Social networking 

D. Personally owned devices 

Answer:

Explanation: 

There many companies that allow full use of social media in the workplace, believing that the marketing opportunities it holds outweigh any loss in productivity. What they are unknowingly minimizing are the threats that exist. Rather than being all new threats, the social networking/media threats tend to fall in the categories of the same old tricks used elsewhere but in a new format. A tweet can be sent with a shortened URL so that it does not exceed the 140-character limit set by Twitter; unfortunately, the user has no idea what the shortened URL leads to. This makes training your employees regarding the risks social networking entails essential.