Want to know Ucertify SY0-401 Exam practice test features? Want to lear more about CompTIA CompTIA Security+ Certification certification experience? Study Practical CompTIA SY0-401 answers to Refresh SY0-401 questions at Ucertify. Gat a success with an absolute guarantee to pass CompTIA SY0-401 (CompTIA Security+ Certification) test on your first attempt.

2021 Dec SY0-401 actual test

Q631. Which of the following devices would be the MOST efficient way to filter external websites for staff on an internal network? 

A. Protocol analyzer 

B. Switch 

C. Proxy 

D. Router 

Answer:

Explanation: 


Q632. Which of the following is an XML based open standard used in the exchange of authentication and authorization information between different parties? 

A. LDAP 

B. SAML 

C. TACACS+ 

D. Kerberos 

Answer:

Explanation: 

Security Assertion Markup Language (SAML) is an open-standard data format centred on XML. It is used for supporting the exchange of authentication and authorization details between systems, services, and devices. 


Q633. After an assessment, auditors recommended that an application hosting company should contract with additional data providers for redundant high speed Internet connections. Which of the following is MOST likely the reason for this recommendation? (Select TWO). 

A. To allow load balancing for cloud support 

B. To allow for business continuity if one provider goes out of business 

C. To eliminate a single point of failure 

D. To allow for a hot site in case of disaster 

E. To improve intranet communication speeds 

Answer: B,C 

Explanation: 

A high-speed internet connection to a second data provider could be used to keep an up-to-date replicate of the main site. In case of problem on the first site, operation can quickly switch to the second site. This eliminates the single point of failure and allows the business to continue uninterrupted on the second site. Note: Recovery Time Objective The recovery time objective (RTO) is the maximum amount of time that a process or service is allowed to be down and the consequences still be considered acceptable. Beyond this time, the break in business continuity is considered to affect the business negatively. The RTO is agreed on during BIA creation. 


Q634. A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue? 

A. The SSID broadcast is disabled. 

B. The company is using the wrong antenna type. 

C. The MAC filtering is disabled on the access point. 

D. The company is not using strong enough encryption. 

Answer:

Explanation: 

When the SSID is broadcast, any device with an automatic detect and connect feature is able to see the network and can initiate a connection with it. The fact that they cannot access the network means that they are unable to see it. 


Q635. Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system? 

A. Input validation 

B. Network intrusion detection system 

C. Anomaly-based HIDS 

D. Peer review 

Answer:

Explanation: 

Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain. 


Refresh SY0-401 free exam:

Q636. A company wants to ensure that its hot site is prepared and functioning. Which of the following would be the BEST process to verify the backup datacenter is prepared for such a scenario? 

A. Site visit to the backup data center 

B. Disaster recovery plan review 

C. Disaster recovery exercise 

D. Restore from backup 

Answer:

Explanation: 

A hot site is a location that can provide operations within hours of a failure. This type of site would have servers, networks, and telecommunications equipment in place to reestablish service in a short time. Hot sites provide network connectivity, systems, and preconfigured software to meet the needs of an organization. This means that an actual exercise run would test the abilities of your hot site best. 


Q637. A user attempting to log on to a workstation for the first time is prompted for the following information before being granted access: username, password, and a four-digit security pin that was mailed to him during account registration. This is an example of which of the following? 

A. Dual-factor authentication 

B. Multifactor authentication 

C. Single factor authentication 

D. Biometric authentication 

Answer:

Explanation: 

Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories: knowledge factors ("things only the user knows"), such as passwords possession factors ("things only the user has"), such as ATM cards inherence factors ("things only the user is"), such as biometrics 

In this question a username, password, and a four-digit security pin knowledge are all knowledge factors (something the user knows). Therefore, this is single-factor authentication. 


Q638. All executive officers have changed their monitor location so it cannot be easily viewed when passing by their offices. Which of the following attacks does this action remediate? 

A. Dumpster Diving 

B. Impersonation 

C. Shoulder Surfing 

D. Whaling 

Answer:

Explanation: 

Viewing confidential information on someone’s monitor is known as shoulder surfing. By moving their monitors so they cannot be seen, the executives are preventing users passing by ‘shoulder surfing’. 

Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is an effective way to get information in crowded places because it's relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done long distance with the aid of binoculars or other vision-enhancing devices. To prevent shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand. 


Q639. Which of the following network architecture concepts is used to securely isolate at the boundary between networks? 

A. VLAN 

B. Subnetting 

C. DMZ 

D. NAT 

Answer:

Explanation: 

A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall. 


Q640. Computer evidence at a crime scene is documented with a tag stating who had possession of the evidence at a given time. 

Which of the following does this illustrate? 

A. System image capture 

B. Record time offset 

C. Order of volatility 

D. Chain of custody 

Answer:

Explanation: 

Chain of custody deals with how evidence is secured, where it is stored, and who has access to it. When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been.