It is more faster and easier to pass the CompTIA SY0-401 exam by using Real CompTIA CompTIA Security+ Certification questuins and answers. Immediate access to the Renew SY0-401 Exam and find the same core area SY0-401 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Nov SY0-401 study guide

Q681. Which of the following is the MOST important step for preserving evidence during forensic procedures? 

A. Involve law enforcement 

B. Chain of custody 

C. Record the time of the incident 

D. Report within one hour of discovery 

Answer:

Explanation: 

Chain of custody deals with how evidence is secured, where it is stored, and who has access to it. 

When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. The evidence must always be within your custody, or you’re open to dispute about possible evidence tampering. Thus to preserve evidence during a forensic procedure the chain of custody is of utmost importance. 


Q682. Highly sensitive data is stored in a database and is accessed by an application on a DMZ server. The disk drives on all servers are fully encrypted. Communication between the application server and end-users is also encrypted. Network ACLs prevent any connections to the database server except from the application server. Which of the following can still result in exposure of the sensitive data in the database server? 

A. SQL Injection 

B. Theft of the physical database server 

C. Cookies 

D. Cross-site scripting 

Answer:

Explanation: 

The question discusses a very secure environment with disk and transport level encryption and access control lists restricting access. SQL data in a database is accessed by SQL queries from an application on the application server. The data can still be compromised by a SQL injection attack. SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. 


Q683. Which of the following is true about an email that was signed by User A and sent to User B? 

A. User A signed with User B’s private key and User B verified with their own public key. 

B. User A signed with their own private key and User B verified with User A’s public key. 

C. User A signed with User B’s public key and User B verified with their own private key. 

D. User A signed with their own public key and User B verified with User A’s private key. 

Answer:

Explanation: 

The sender uses his private key, in this case User A's private key, to create a digital signature. 

The message is, in effect, signed with the private key. The sender then sends the message to the 

receiver. The receiver (User B) uses the public key attached to the message to validate the digital 

signature. If the values match, the receiver knows the message is authentic. 

The receiver uses a key provided by the sender—the public key—to decrypt the message. 


Q684. A security technician wishes to gather and analyze all Web traffic during a particular time period. 

Which of the following represents the BEST approach to gathering the required data? 

A. Configure a VPN concentrator to log all traffic destined for ports 80 and 443. 

B. Configure a proxy server to log all traffic destined for ports 80 and 443. 

C. Configure a switch to log all traffic destined for ports 80 and 443. 

D. Configure a NIDS to log all traffic destined for ports 80 and 443. 

Answer:

Explanation: 

A proxy server is in essence a device that acts on behalf of others and in security terms all internal user interaction with the Internet should be controlled through a proxy server. This makes a proxy server the best tool to gather the required data. 


Improve SY0-401 dumps:

Q685. When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes. Which of the following design elements would be implemented to comply with the security administrator’s request? 

A. DMZ 

B. Cloud services 

C. Virtualization 

D. Sandboxing 

Answer:

Explanation: 

A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall. 


Q686. Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address? 

A. Interference 

B. Man-in-the-middle 

C. ARP poisoning 

D. Rogue access point 

Answer:

Explanation: 

MAC filtering is typically used in wireless networks. In computer networking, MAC Filtering (or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. 

In this question, a rogue access point would need to be able to connect to the network to provide access to network resources. If the MAC address of the rogue access point isn’t allowed to connect to the network port, then the rogue access point will not be able to connect to the network. 


Q687. Some customers have reported receiving an untrusted certificate warning when visiting the company’s website. The administrator ensures that the certificate is not expired and that customers have trusted the original issuer of the certificate. Which of the following could be causing the problem? 

A. The intermediate CA certificates were not installed on the server. 

B. The certificate is not the correct type for a virtual server. 

C. The encryption key used in the certificate is too short. 

D. The client’s browser is trying to negotiate SSL instead of TLS. 

Answer:

Explanation: 

In a hierarchical trust model, also known as a tree, a root CA at the top provides all of the information. The intermediate CAs are next in the hierarchy, and they trust only information provided by the root CA. The root CA also trusts intermediate CAs that are in their level in the hierarchy and none that aren’t. 


Q688. A user has received an email from an external source which asks for details on the company’s new product line set for release in one month. The user has a detailed spec sheet but it is marked "Internal Proprietary Information". Which of the following should the user do NEXT? 

A. Contact their manager and request guidance on how to best move forward 

B. Contact the help desk and/or incident response team to determine next steps 

C. Provide the requestor with the email information since it will be released soon anyway 

D. Reply back to the requestor to gain their contact information and call them 

Answer:

Explanation: 

This is an incident that has to be responded to by the person who discovered it- in this case the user. An incident is any attempt to violate a security policy, a successful penetration, a compromise of a system, or any unauthorized access to information. It’s important that an incident response policy establish at least the following items: Outside agencies that should be contacted or notified in case of an incident Resources used to deal with an incident Procedures to gather and secure evidence List of information that should be collected about an incident Outside experts who can be used to address issues if needed Policies and guidelines regarding how to handle an incident 

Since the spec sheet has been marked Internal Proprietary Information the user should refer the incident to the incident response team. 


Q689. A large multinational corporation with networks in 30 countries wants to establish an understanding of their overall public-facing network attack surface. Which of the following security techniques would be BEST suited for this? 

A. External penetration test 

B. Internal vulnerability scan 

C. External vulnerability scan 

D. Internal penetration test 

Answer:

Explanation: