Examcollection guarantee that you will acquire certified absolutely with all the assistance of each of our authentic and precise materials. If you make fantastic achievements in the very first attempt, you will also select Examcollection as the next certification exam practice components supplier. Our consumer support may keep throughout touch with you and supplying you the helping hand timely once you get directly into troubles. It?¡¥s our duty and main target to reside up to the expectations and satisfaction. The IT professors make great attempts to create your CompTIA CompTIA exam questions and supply the verified answers. With the prefect answers, you can get the full and thorough understanding for that CompTIA SY0-401 exam. And getting certified isnt problem soon after you ready yourself well.

2021 Nov SY0-401 free practice test

Q501. Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario? 

A. Application Firewall 

B. Anomaly Based IDS 

C. Proxy Firewall 

D. Signature IDS 

Answer:

Explanation: 

Anomaly-based detection watches the ongoing activity in the environment and looks for abnormal occurrences. An anomaly-based monitoring or detection method relies on definitions of all valid forms of activity. This database of known valid activity allows the tool to detect any and all anomalies. Anomaly-based detection is commonly used for protocols. Because all the valid and legal forms of a protocol are known and can be defined, any variations from those known valid constructions are seen as anomalies. 


Q502. Which of the following is an example of a false positive? 

A. Anti-virus identifies a benign application as malware. 

B. A biometric iris scanner rejects an authorized user wearing a new contact lens. 

C. A user account is locked out after the user mistypes the password too many times. 

D. The IDS does not identify a buffer overflow. 

Answer:

Explanation: 

A false positive is an error in some evaluation process in which a condition tested for is mistakenly found to have been detected. In spam filters, for example, a false positive is a legitimate message mistakenly marked as UBE --unsolicited bulk email, as junk email is more formally known. Messages that are determined to be spam -- whether correctly or incorrectly -- may be rejected by a server or client-side spam filter and returned to the sender as bounce e-mail. One problem with many spam filtering tools is that if they are configured stringently enough to be effective, there is a fairly high chance of getting false positives. The risk of accidentally blocking an important message has been enough to deter many companies from implementing any anti-spam measures at all. False positives are also common in security systems. A host intrusion prevention system (HIPS), for example, looks for anomalies, such as deviations in bandwidth, protocols and ports. When activity varies outside of an acceptable range – for example, a remote application attempting to open a normally closed port -- an intrusion may be in progress. However, an anomaly, such as a sudden spike in bandwidth use, does not guarantee an actual attack, so this approach amounts to an educated guess and the chance for false positives can be high. False positives contrast with false negatives, which are results indicating mistakenly that some condition tested for is absent. 


Q503. When an order was submitted via the corporate website, an administrator noted special characters (e.g., ";--" and "or 1=1 --") were input instead of the expected letters and numbers. 

Which of the following is the MOST likely reason for the unusual results? 

A. The user is attempting to highjack the web server session using an open-source browser. 

B. The user has been compromised by a cross-site scripting attack (XSS) and is part of a botnet performing DDoS attacks. 

C. The user is attempting to fuzz the web server by entering foreign language characters which are incompatible with the website. 

D. The user is sending malicious SQL injection strings in order to extract sensitive company or customer data via the website. 

Answer:

Explanation: 

The code in the question is an example of a SQL Injection attack. The code ‘1=1’ will always provide a value of true. This can be included in statement designed to return all rows in a SQL table. 

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. 


Q504. The use of social networking sites introduces the risk of: 

A. Disclosure of proprietary information 

B. Data classification issues 

C. Data availability issues 

D. Broken chain of custody 

Answer:

Explanation: 

People and processes must be in place to prevent the unauthorized disclosure or proprietary information and sensitive information s these pose a security risk to companies. With social networking your company can be exposed to as many threats as the amount of users that make use of social networking and are not advised on security policy regarding the use of social networking. 


Q505. A network administrator wants to block both DNS requests and zone transfers coming from outside IP addresses. The company uses a firewall which implements an implicit allow and is currently configured with the following ACL applied to its external interface. 

PERMIT TCP ANY ANY 80 

PERMIT TCP ANY ANY 443 

Which of the following rules would accomplish this task? (Select TWO). 

A. Change the firewall default settings so that it implements an implicit deny 

B. Apply the current ACL to all interfaces of the firewall 

C. Remove the current ACL 

D. Add the following ACL at the top of the current ACL DENY TCP ANY ANY 53 

E. Add the following ACL at the bottom of the current ACL DENY ICMP ANY ANY 53 

F. Add the following ACL at the bottom of the current ACL DENY IP ANY ANY 53 

Answer: A,F 

Explanation: 

Implicit deny is the default security stance that says if you aren’t specifically granted access or privileges for a resource, you’re denied access by default. Implicit deny is the default response when an explicit allow or deny isn’t present. 

DNS operates over TCP and UDP port 53. TCP port 53 is used for zone transfers. These are zone file exchanges between DNS servers, special manual queries, or used when a response exceeds 512 bytes. UDP port 53 is used for most typical DNS queries. 


Latest SY0-401 torrent:

Q506. Jane, a security administrator, has been tasked with explaining authentication services to the company’s management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company’s environment? 

A. Kerberos 

B. Least privilege 

C. TACACS+ 

D. LDAP 

Answer:

Explanation: 

Kerberos was accepted by Microsoft as the chosen authentication protocol for Windows 2000 and Active Directory domains that followed. 


Q507. Digital Signatures provide which of the following? 

A. Confidentiality 

B. Authorization 

C. Integrity 

D. Authentication 

E. Availability 

Answer:

Explanation: 

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. 


Q508. A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks. 

Which of the following is MOST likely the reason for the sub-interfaces? 

A. The network uses the subnet of 255.255.255.128. 

B. The switch has several VLANs configured on it. 

C. The sub-interfaces are configured for VoIP traffic. 

D. The sub-interfaces each implement quality of service. 

Answer:

Explanation: 

A subinterface is a division of one physical interface into multiple logical interfaces. Routers commonly employ subinterfaces for a variety of purposes, most common of these are for routing traffic between VLANs. Also, IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network. 


Q509. If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing? 

A. Transitive trust 

B. Public key trust 

C. Certificate authority trust 

D. Domain level trust 

Answer:

Explanation: 

In transitive trusts, trust between a first party and a third party flows through a second party that is trusted by both the first party and the third party. 


Q510. An administrator finds that non-production servers are being frequently compromised, production servers are rebooting at unplanned times and kernel versions are several releases behind the version with all current security fixes. 

Which of the following should the administrator implement? 

A. Snapshots 

B. Sandboxing 

C. Patch management 

D. Intrusion detection system 

Answer:

Explanation: 

Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps protect a systems from newly discovered attacks and vulnerabilities.