Our pass rate is high to 98.9% and the similarity percentage between our sy0 401 practice exam study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the CompTIA sy0 401 braindump exam in just one try? I am currently studying for the CompTIA sy0 401 braindump exam. Latest CompTIA comptia security+ sy0 401 Test exam practice questions and answers, Try CompTIA comptia sy0 401 Brain Dumps First.

Q1. Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST level of security training for the executives? (Select TWO). 

A. Acceptable use of social media 

B. Data handling and disposal 

C. Zero day exploits and viruses 

D. Phishing threats and attacks 

E. Clean desk and BYOD 

F. Information security awareness 

Answer: D,F 

Explanation: 

Managers/ i.e. executives in the company are concerned with more global issues in the organization, including enforcing security policies and procedures. Managers should receive additional training or exposure that explains the issues, threats, and methods of dealing with threats. Management will also be concerned about productivity impacts and enforcement and how the various departments are affected by security policies. Phishing is a form of social engineering in which you ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. An email might look as if it is from a bank and contain some basic information, such as the user’s name. Executives an easily fall prey to phishing if they are not trained to lookout for these attacks. 


Q2. Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO). 

A. Disable the USB root hub within the OS. 

B. Install anti-virus software on the USB drives. 

C. Disable USB within the workstations BIOS. 

D. Apply the concept of least privilege to USB devices. 

E. Run spyware detection against all workstations. 

Answer: A,C 

Explanation: 

A: The USB root hub can be disabled from within the operating system. 

C: USB can also be configured and disabled in the system BIOS. 


Q3. Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network? 

A. Near field communication 

B. IV attack 

C. Evil twin 

D. Replay attack 

Answer:

Explanation: 

An initialization vector is a random number used in combination with a secret key as a means to encrypt data. This number is sometimes referred to as a nonce, or “number occurring once,” as an encryption program uses it only once per session. An initialization vector is used to avoid repetition during the data encryption process, making it impossible for hackers who use dictionary attack to decrypt the exchanged encrypted message by discovering a pattern. This is known as an IV attack. A particular binary sequence may be repeated more than once in a message, and the more it appears, the more the encryption method is discoverable. For example if a one-letter word exists in a message, it may be either “a” or “I” but it can’t be “e” because the word “e” is non-sensical in English, while “a” has a meaning and “I” has a meaning. Repeating the words and letters makes it possible for software to apply a dictionary and discover the binary sequence corresponding to 

each letter. 

Using an initialization vector changes the binary sequence corresponding to each letter, enabling 

the letter “a” to be represented by a particular sequence in the first instance, and then represented 

by a completely different binary sequence in the second instance. 

WEP (Wireless Equivalent Privacy) is vulnerable to an IV attack. Because RC4 is a stream cipher, 

the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain 

text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy 

network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there 

is a 50% probability the same IV will repeat after 5000 packets. 


Q4. After Matt, a user enters his username and password at the login screen of a web enabled portal, the following appears on his screen: 

`Please only use letters and numbers on these fields’ 

Which of the following is this an example of? 

A. Proper error handling 

B. Proper input validation 

C. Improper input validation 

D. Improper error handling 

Answer:

Explanation: 

Input validation is an aspect of secure coding and is intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain. 


Q5. The IT department has setup a share point site to be used on the intranet. Security has established the groups and permissions on the site. No one may modify the permissions and all requests for access are centrally managed by the security team. This is an example of which of the following control types? 

A. Rule based access control 

B. Mandatory access control 

C. User assigned privilege 

D. Discretionary access control 

Answer:

Explanation: 

Discretionary access control (DAC) allows access to be granted or restricted by an object’s owner based on user identity and on the discretion of the object owner. 


Q6. While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks? 

A. Cross-site scripting 

B. Buffer overflow 

C. Header manipulation 

D. Directory traversal 

Answer:

Explanation: 

When the user opens an attachment, the attachment is loaded into memory. The error is caused by a memory issue due to a buffer overflow attack. 

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability. 


Q7. An organization has introduced token-based authentication to system administrators due to risk of password compromise. The tokens have a set of numbers that automatically change every 30 seconds. Which of the following type of authentication mechanism is this? 

A. TOTP 

B. Smart card 

C. CHAP 

D. HOTP 

Answer:

Explanation: 

Time-based one-time password (TOTP) tokens are devices or applications that generate passwords at fixed time intervals. In this case, it’s every 30 seconds. 


Q8. Methods to test the responses of software and web applications to unusual or unexpected inputs are known as: 

A. Brute force. 

B. HTML encoding. 

C. Web crawling. 

D. Fuzzing. 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks.