It is impossible to pass CompTIA SY0-401 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed CompTIA SY0-401 practice questions. You will get a surprising result by our Renewal CompTIA Security+ Certification practice guides.

2021 Nov SY0-401 study guide

Q131. Which of the following is the GREATEST security risk of two or more companies working together under a Memorandum of Understanding? 

A. Budgetary considerations may not have been written into the MOU, leaving an entity to absorb more cost than intended at signing. 

B. MOUs have strict policies in place for services performed between the entities and the penalties for compromising a partner are high. 

C. MOUs are generally loose agreements and therefore may not have strict guidelines in place to protect sensitive data between the two entities. 

D. MOUs between two companies working together cannot be held to the same legal standards as SLAs. 

Answer:

Explanation: 

The Memorandum of Understanding This document is used in many settings in the information industry. It is a brief summary of which party is responsible for what portion of the work. For example, Company A may be responsible for maintaining the database server and Company B may be responsible for telecommunications. MOUs are not legally binding but they carry a degree of seriousness and mutual respect, stronger than a gentlemen’s agreement. Often, MOUs are the first steps towards a legal contract. 


Q132. How must user accounts for exiting employees be handled? 

A. Disabled, regardless of the circumstances 

B. Disabled if the employee has been terminated 

C. Deleted, regardless of the circumstances 

D. Deleted if the employee has been terminated 

Answer:

Explanation: 

You should always disable an employee’s account as soon as they leave. The employee knows the username and password of the account and could continue to log in for potentially malicious purposes. Disabling the account will ensure that no one can log in using that account. 


Q133. A security technician at a small business is worried about the Layer 2 switches in the network suffering from a DoS style attack caused by staff incorrectly cabling network connections between switches. 

Which of the following will BEST mitigate the risk if implemented on the switches? 

A. Spanning tree 

B. Flood guards 

C. Access control lists 

D. Syn flood 

Answer:

Explanation: 

Spanning Tree is designed to eliminate network ‘loops’ from incorrect cabling between switches. Imagine two switches named switch 1 and switch 2 with two network cables connecting the switches. This would cause a network loop. A network loop between two switches can cause a ‘broadcast storm’ where a broadcast packet is sent out of all ports on switch 1 which includes two links to switch 2. The broadcast packet is then sent out of all ports on switch 2 which includes links back to switch 1. The broadcast packet will be sent out of all ports on switch 1 again which includes two links to switch 2 and so on thus flooding the network with broadcast traffic. The Spanning-Tree Protocol (STP) was created to overcome the problems of transparent bridging in redundant networks. The purpose of STP is to avoid and eliminate loops in the network by negotiating a loop-free path through a root bridge. This is done by determining where there are loops in the network and blocking links that are redundant. Spanning-Tree Protocol executes an algorithm called the Spanning-Tree Algorithm (STA). In order to find redundant links, STA will choose a reference point called a Root Bridge, and then determines all the available paths to that reference point. If it finds a redundant path, it chooses for the best path to forward and for all other redundant paths to block. This effectively severs the redundant links within the network. All switches participating in STP gather information on other switches in the network through an exchange of data messages. These messages are referred to as Bridge Protocol Data Units (BPDUs). The exchange of BPDUs in a switched environment will result in the election of a root switch for the stable spanning-tree network topology, election of designated switch for every switched segment, and the removal of loops in the switched network by placing redundant switch ports in a backup state. 


Q134. A financial company requires a new private network link with a business partner to cater for realtime and batched data flows. 

Which of the following activities should be performed by the IT security staff member prior to establishing the link? 

A. Baseline reporting 

B. Design review 

C. Code review 

D. SLA reporting 

Answer:

Explanation: 

This question is asking about a new private network link (a VPN) with a business partner. This will 

provide access to the local network from the business partner. 

When implementing a VPN, an important step is the design of the VPN. The VPN should be 

designed to ensure that the security of the network and local systems is not compromised. 

The design review assessment examines the ports and protocols used, the rules, segmentation, 

and access control in the systems or applications. A design review is basically a check to ensure 

that the design of the system meets the security requirements. 


Q135. A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of the following can the technician use to verify if a system file was compromised? (Select TWO). 

A. AES 

B. PGP 

C. SHA 

D. MD5 

E. ECDHE 

Answer: C,D 

Explanation: 


Up to date SY0-401 free exam questions:

Q136. During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR). 

A. 21 

B. 22 

C. 23 

D. 69 

E. 3389 

F. SSH 

G. Terminal services 

H. Rlogin 

I. Rsync 

J. Telnet 

Answer: B,C,F,J 

Explanation: 

The question states that Jane was able to establish a connection to an internal router. Typical 

ports and protocols used to connect to a router include the following: 

B, F: Port 22 which is used by SSH (Secure Shell). 

C, J: Port 23 which is used by Telnet. 

SSH and Telnet both provide command line interfaces for administering network devices such as 

routers and switches. 


Q137. Which of the following controls can be implemented together to prevent data loss in the event of theft of a mobile device storing sensitive information? (Select TWO). 

A. Full device encryption 

B. Screen locks 

C. GPS 

D. Asset tracking 

E. Inventory control 

Answer: A,B 

Explanation: 

A: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. 

B: Screen locks are a security feature that requires the user to enter a PIN or a password after a short period of inactivity before they can access the system again. This feature ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications. 


Q138. Which of the following are examples of detective controls? 

A. Biometrics, motion sensors and mantraps. 

B. Audit, firewall, anti-virus and biometrics. 

C. Motion sensors, intruder alarm and audit. 

D. Intruder alarm, mantraps and firewall. 

Answer:

Explanation: 


Q139. A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed? 

A. The request needs to be sent to the incident management team. 

B. The request needs to be approved through the incident management process. 

C. The request needs to be approved through the change management process. 

D. The request needs to be sent to the change management team. 

Answer:

Explanation: 

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. Thus the actual switch configuration should first be subject to the change management approval. 


Q140. FTP/S uses which of the following TCP ports by default? 

A. 20 and 21 

B. 139 and 445 

C. 443 and 22 

D. 989 and 990 

Answer:

Explanation: FTPS uses ports 989 and 990.