It really is that will emphasize anyone this, bafore determining to use the That certification audit, we should be aware that while in the That industry you cannot find any kind of certification which usually is"one specifications satisfies all" there market. Since the specifications of the companys own characteristics within the That market, it offers quite high-quality department of employment, for instance an on-line, company applications, software program enhancement, personal computer unit installation as well as care, data source, artwork, impression control and lots of additional unique regions. On top of that, because the That market, new regions will likely still appear, an innovative personal computer certification will likely emerged, the actual certificates shall be continuously refreshed. If an applicant promises to get hired to play a That industry, he or she will need to increase a cerfitications in this industry approximately possilbe. He will need to be aware that perhaps the coolest CompTIA Security+ Certification is just not almighty. For that reason, doing instruction as well as assessments must be specific on the almost all well-respected as well as up-authentication certificates, to get a senior step to go into the That market.

2021 Nov SY0-401 free practice test

Q581. Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished? 

A. Create a VLAN without a default gateway. 

B. Remove the network from the routing table. 

C. Create a virtual switch. 

D. Commission a stand-alone switch. 

Answer:

Explanation: 

A Hyper-V Virtual Switch implements policy enforcement for security, isolation, and service levels. 


Q582. Which of the following is a vulnerability associated with disabling pop-up blockers? 

A. An alert message from the administrator may not be visible 

B. A form submitted by the user may not open 

C. The help window may not be displayed 

D. Another browser instance may execute malicious code 

Answer:

Explanation: Pop-up blockers prevent websites from opening new browser windows without the users consent. These are often used for advertisements but can also be used to distribute malicious code. 


Q583. Which of the following is synonymous with a server’s certificate? 

A. Public key 

B. CRL 

C. Private key 

D. Recovery agent 

Answer:

Explanation: 

A public key certificate (also known as a digital certificate or identity certificate) is an electronic document used to prove ownership of a public key. 


Q584. Which of the following offers the LEAST amount of protection against data theft by USB drives? 

A. DLP 

B. Database encryption 

C. TPM 

D. Cloud computing 

Answer:

Explanation: 

Cloud computing refers to performing data processing and storage elsewhere, over a network connection, rather than locally. Because users have access to the data, it can easily be copied to a USB device. 


Q585. The systems administrator wishes to implement a hardware-based encryption method that could also be used to sign code. They can achieve this by: 

A. Utilizing the already present TPM. 

B. Configuring secure application sandboxes. 

C. Enforcing whole disk encryption. 

D. Moving data and applications into the cloud. 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Improved SY0-401 exam cram:

Q586. While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks? 

A. Cross-site scripting 

B. Buffer overflow 

C. Header manipulation 

D. Directory traversal 

Answer:

Explanation: 

When the user opens an attachment, the attachment is loaded into memory. The error is caused by a memory issue due to a buffer overflow attack. 

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability. 


Q587. Which of the following explains the difference between a public key and a private key? 

A. The public key is only used by the client while the private key is available to all. Both keys are mathematically related. 

B. The private key only decrypts the data while the public key only encrypts the data. Both keys are mathematically related. 

C. The private key is commonly used in symmetric key decryption while the public key is used in asymmetric key decryption. 

D. The private key is only used by the client and kept secret while the public key is available to all. 

Answer:

Explanation: 

The private key must be kept secret at all time. The private key is only by the client. The public key is available to anybody. 


Q588. Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described? 

A. Phishing 

B. Tailgating 

C. Pharming 

D. Vishing 

Answer:

Explanation: 

Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities. Vishing works like phishing but does not always occur over the Internet and is carried out using voice technology. A vishing attack can be conducted by voice email, VoIP (voice over IP), or landline or cellular telephone. The potential victim receives a message, often generated by speech synthesis, indicating that suspicious activity has taken place in a credit card account, bank account, mortgage account or other financial service in their name. The victim is told to call a specific telephone number and provide information to "verify identity" or to "ensure that fraud does not occur." If the attack is carried out by telephone, caller ID spoofing can cause the victim's set to indicate a legitimate source, such as a bank or a government agency. 

Vishing is difficult for authorities to trace, particularly when conducted using VoIP. Furthermore, like many legitimate customer services, vishing scams are often outsourced to other countries, which may render sovereign law enforcement powerless. 

Consumers can protect themselves by suspecting any unsolicited message that suggests they are targets of illegal activity, no matter what the medium or apparent source. Rather than calling a number given in any unsolicited message, a consumer should directly call the institution named, using a number that is known to be valid, to verify all recent activity and to ensure that the account information has not been tampered with. 


Q589. Due to issues with building keys being duplicated and distributed, a security administrator wishes to change to a different security control regarding a restricted area. The goal is to provide access based upon facial recognition. Which of the following will address this requirement? 

A. Set up mantraps to avoid tailgating of approved users. 

B. Place a guard at the entrance to approve access. 

C. Install a fingerprint scanner at the entrance. 

D. Implement proximity readers to scan users’ badges. 

Answer:

Explanation: 

A guard can be instructed to deny access until authentication has occurred will address the situation adequately. 


Q590. Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended? 

A. Screen lock 

B. Voice encryption 

C. GPS tracking 

D. Device encryption 

Answer:

Explanation: 

Screen-lock is a security feature that requires the user to enter a PIN or a password after a short period of inactivity before they can access the system again. This feature ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications.