If youre getting any specialised job, any CompTIA will almost allways be a little push additionally the brand of job hopefuls which are definitely not credentialed. That said, plenty of organisations demands CompTIA SY0-401 entitled to apply for employment, just do employment seek out and you may notice a several job jobs that might be readily available for apps that you can struggle to get today. Solely since they have to have that much cla regarding recognition which will often be not a problem that you reach!

2021 Nov SY0-401 vce

Q551. After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the document is no longer encrypted. Which of the following can a security technician implement to ensure that documents stored on Joe’s desktop remain encrypted when moved to external media or other network based storage? 

A. Whole disk encryption 

B. Removable disk encryption 

C. Database record level encryption 

D. File level encryption 

Answer:

Explanation: 

Encryption is used to ensure the confidentiality of information. In this case you should make use of file level encryption. File level encryption is a form of disk encryption where individual files or directories are encrypted by the file system itself. This is in contrast to full disk encryption where the entire partition or disk, in which the file system resides, is encrypted. 


Q552. Verifying the integrity of data submitted to a computer program at or during run-time, with the intent of preventing the malicious exploitation of unintentional effects in the structure of the code, is BEST described as which of the following? 

A. Output sanitization 

B. Input validation 

C. Application hardening 

D. Fuzzing 

Answer:

Explanation: 


Q553. After encrypting all laptop hard drives, an executive officer’s laptop has trouble booting to the operating system. Now that it is successfully encrypted the helpdesk cannot retrieve the data. 

Which of the following can be used to decrypt the information for retrieval? 

A. Recovery agent 

B. Private key 

C. Trust models 

D. Public key 

Answer:

Explanation: 

To access the data the hard drive need to be decrypted. To decrypt the hard drive you would need 

the proper private key. The key recovery agent can retrieve the required key. 

A key recovery agent is an entity that has the ability to recover a key, key components, or plaintext 

messages as needed. 


Q554. Which of the following would provide the STRONGEST encryption? 

A. Random one-time pad 

B. DES with a 56-bit key 

C. AES with a 256-bit key 

D. RSA with a 1024-bit key 

Answer:

Explanation: 

One-time pads are the only truly completely secure cryptographic implementations. 

They are so secure for two reasons. First, they use a key that is as long as a plaintext message. 

That means there is no pattern in the key application for an attacker to use. Also, one-time pad 

keys are used only once and then discarded. So even if you could break a one-time pad cipher, 

that same key would never be used again, so knowledge of the key would be useless. 


Q555. Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network? 

A. Single sign on 

B. IPv6 

C. Secure zone transfers 

D. VoIP 

Answer:

Explanation: 

C: A primary DNS server has the "master copy" of a zone, and secondary DNS servers keep copies of the zone for redundancy. When changes are made to zone data on the primary DNS server, these changes must be distributed to the secondary DNS servers for the zone. This is done through zone transfers. If you allow zone transfers to any server, all the resource records in the zone are viewable by any host that can contact your DNS server. Thus you will need to secure the zone transfers to stop an attacker from mapping out your addresses and devices on your network. 


Far out SY0-401 study guide:

Q556. Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company? 

A. Vulnerability scanner 

B. Honeynet 

C. Protocol analyzer 

D. Port scanner 

Answer:

Explanation: 

The Internet hosts used to gather data on new malware are known as honeypots. A collection of honeypots is known as a honeynet. A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. The Honeynet Project, a non-profit research organization dedicated to computer security and information sharing, actively promotes the deployment of honeynets. In addition to the honey pots, a honeynet usually has real applications and services so that it seems like a normal network and a worthwhile target. However, because the honeynet doesn't actually serve any authorized users, any attempt to contact the network from without is likely an illicit attempt to breach its security, and any outbound activity is likely evidence that a system has been compromised. For this reason, the suspect information is much more apparent than it would be in an actual network, where it would have to be found amidst all the legitimate network data. Applications within a honeynet are often given names such as "Finances" or "Human Services" to make them sound appealing to the attacker. 

A virtual honeynet is one that, while appearing to be an entire network, resides on a single server. 


Q557. The fundamental information security principals include confidentiality, availability and which of the following? 

A. The ability to secure data against unauthorized disclosure to external sources 

B. The capacity of a system to resist unauthorized changes to stored information 

C. The confidence with which a system can attest to the identity of a user 

D. The characteristic of a system to provide uninterrupted service to authorized users 

Answer:

Explanation: Confidentiality, integrity, and availability, which make up the CIA triad, are the three most important concepts in security. In this instance, the answer describes the Integrity part of the CIA triad. 


Q558. A security administrator forgets their card to access the server room. The administrator asks a coworker if they could use their card for the day. Which of the following is the administrator using to gain access to the server room? 

A. Man-in-the-middle 

B. Tailgating 

C. Impersonation 

D. Spoofing 

Answer:

Explanation: 

Impersonation is where a person, computer, software application or service pretends to be someone or something it’s not. Impersonation is commonly non-maliciously used in client/server applications. However, it can also be used as a security threat. 

In this question, by using the coworker’s card, the security administrator is ‘impersonating’ the coworker. The server room locking system and any logging systems will ‘think’ that the coworker has entered the server room. 


Q559. Digital signatures are used for ensuring which of the following items? (Select TWO). 

A. Confidentiality 

B. Integrity 

C. Non-Repudiation 

D. Availability 

E. Algorithm strength 

Answer: B,C 

Explanation: 

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. The message is encrypted using the encryption system, and a second piece of information, the digital signature, is added to the message. Nonrepudiation prevents one party from denying actions that they carried out and in the electronic world nonrepudiation measures can be a two-key cryptographic system and the involvement of a third party to verify the validity. This respected third party ‘vouches’ for the individuals in the two-key system. Thus non-repudiation also impacts on integrity. 


Q560. A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them to customer PCs. Which of the following should the administrator use to test the patching process quickly and often? 

A. Create an incremental backup of an unpatched PC 

B. Create an image of a patched PC and replicate it to servers 

C. Create a full disk image to restore after each installation 

D. Create a virtualized sandbox and utilize snapshots 

Answer:

Explanation: