The choices with CompTIA company widely-used simply by many individuals for a lot of a good several years. Your CompTIA certifications are your tattoo with credibility in addition to consent. The assumption is this to be able to demonstrate on your own in the industry, you need more then one qualification of your Pass4sure SY0-401. To get a CompTIA, you need to spend time in addition to do hard work. One of the primary obstructions with passing your CompTIA Security+ Certification SY0-401 exam is how to start off. Normally, get yourself ready for your CompTIA SY0-401 qualification exam should develop a in depth blueprints. Roadmap for this qualification provides you the suitable place to begin this also technique may help you fix the challenge quickly.

2021 Oct SY0-401 rapidshare

Q331. Which of the following helps to apply the proper security controls to information? 

A. Data classification 

B. Deduplication 

C. Clean desk policy 

D. Encryption 

Answer:

Explanation: 

Information classification is done by confidentiality and comprises of three categories, namely: public use, internal use and restricted use. These categories make applying the appropriate policies and security controls practical. 


Q332. Which of the following should Joe, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from his company? 

A. Privacy Policy 

B. Least Privilege 

C. Acceptable Use 

D. Mandatory Vacations 

Answer:

Explanation: 

When one person fills in for another, such as for mandatory vacations, it provides an opportunity to see what the person is doing and potentially uncover any fraud. 


Q333. Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network? 

A. Near field communication 

B. IV attack 

C. Evil twin 

D. Replay attack 

Answer:

Explanation: 

An initialization vector is a random number used in combination with a secret key as a means to encrypt data. This number is sometimes referred to as a nonce, or “number occurring once,” as an encryption program uses it only once per session. An initialization vector is used to avoid repetition during the data encryption process, making it impossible for hackers who use dictionary attack to decrypt the exchanged encrypted message by discovering a pattern. This is known as an IV attack. A particular binary sequence may be repeated more than once in a message, and the more it appears, the more the encryption method is discoverable. For example if a one-letter word exists in a message, it may be either “a” or “I” but it can’t be “e” because the word “e” is non-sensical in English, while “a” has a meaning and “I” has a meaning. Repeating the words and letters makes it possible for software to apply a dictionary and discover the binary sequence corresponding to 

each letter. 

Using an initialization vector changes the binary sequence corresponding to each letter, enabling 

the letter “a” to be represented by a particular sequence in the first instance, and then represented 

by a completely different binary sequence in the second instance. 

WEP (Wireless Equivalent Privacy) is vulnerable to an IV attack. Because RC4 is a stream cipher, 

the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain 

text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy 

network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there 

is a 50% probability the same IV will repeat after 5000 packets. 


Q334. A technician has implemented a system in which all workstations on the network will receive security updates on the same schedule. Which of the following concepts does this illustrate? 

A. Patch management 

B. Application hardening 

C. White box testing 

D. Black box testing 

Answer:

Explanation: 

Explanation: Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps protect a systems from newly discovered attacks and vulnerabilities. A part of patch management is testing the effects of vendor updates on a test system before applying the updates on a production system, and scheduling updates. 


Q335. A network administrator uses an RFID card to enter the datacenter, a key to open the server rack, and a username and password to logon to a server. These are examples of which of the following? 

A. Multifactor authentication 

B. Single factor authentication 

C. Separation of duties 

D. Identification 

Answer:

Explanation: 

Single-factor authentication (SFA) is a process for securing access to a given system by identifying the party requesting access via a single category of credentials. In this case, the network administrator makes use of an RFID card to access the datacenter, a key to access the server rack, and a username and password to access a server. 


Up to the minute SY0-401 free practice test:

Q336. An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files should be copied from srv4 to accomplish this? 

A. certificate, private key, and intermediate certificate chain 

B. certificate, intermediate certificate chain, and root certificate 

C. certificate, root certificate, and certificate signing request 

D. certificate, public key, and certificate signing request 

Answer:

Explanation: 

a wildcard certificate is a public key certificate which can be used with multiple subdomains of a domain. In public-key cryptography, the receiver has a private key known only to them; a public key corresponds to it, which they make known to others. The public key can be sent to all other parties; the private key is never divulged. A symmetric algorithm requires that receivers of the message use the same private key. Thus you should copy the certificate, the private key and the intermediate certificate chain from srv4 to srv5. 


Q337. A hacker has discovered a simple way to disrupt business for the day in a small company which relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely working staff access to company systems with a script. Which of the following security controls is the hacker exploiting? 

A. DoS 

B. Account lockout 

C. Password recovery 

D. Password complexity 

Answer:

Explanation: 

B: Account lockout automatically disables an account due to repeated failed log on attempts. The hacker must have executed a script to repeatedly try logging on to the remote accounts, forcing the account lockout policy to activate. 


Q338. Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST level of security training for the executives? (Select TWO). 

A. Acceptable use of social media 

B. Data handling and disposal 

C. Zero day exploits and viruses 

D. Phishing threats and attacks 

E. Clean desk and BYOD 

F. Information security awareness 

Answer: D,F 

Explanation: 

Managers/ i.e. executives in the company are concerned with more global issues in the organization, including enforcing security policies and procedures. Managers should receive additional training or exposure that explains the issues, threats, and methods of dealing with threats. Management will also be concerned about productivity impacts and enforcement and how the various departments are affected by security policies. Phishing is a form of social engineering in which you ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. An email might look as if it is from a bank and contain some basic information, such as the user’s name. Executives an easily fall prey to phishing if they are not trained to lookout for these attacks. 


Q339. What is the term for the process of luring someone in (usually done by an enforcement officer or a government agent)? 

A. Enticement 

B. Entrapment 

C. Deceit 

D. Sting 

Answer:

Explanation: 

Enticement is the process of luring someone into your plan or trap. 


Q340. A new security analyst is given the task of determining whether any of the company’s servers are vulnerable to a recently discovered attack on an old version of SSH. Which of the following is the quickest FIRST step toward determining the version of SSH running on these servers? 

A. Passive scanning 

B. Banner grabbing 

C. Protocol analysis 

D. Penetration testing 

Answer:

Explanation: 

B: Banner grabbing looks at the banner, or header information messages sent with data to find out about the system(s). Banners often identify the host, the operating system running on it, and other information that can be useful if you are going to attempt to later breach the security of it. Banners can be snagged with Telnet as well as tools like netcat or Nmap. In other words Banner grabbing looks at the banner, or header, information messages sent with data to find out about the system(s). Thus a quick way to check which version of SSH is running on your server.