Want to know Actualtests SY0-401 Exam practice test features? Want to lear more about CompTIA CompTIA Security+ Certification certification experience? Study 100% Guarantee CompTIA SY0-401 answers to Rebirth SY0-401 questions at Actualtests. Gat a success with an absolute guarantee to pass CompTIA SY0-401 (CompTIA Security+ Certification) test on your first attempt.

2021 Dec SY0-401 question

Q191. Which of the following, if properly implemented, would prevent users from accessing files that are unrelated to their job duties? (Select TWO). 

A. Separation of duties 

B. Job rotation 

C. Mandatory vacation 

D. Time of day restrictions 

E. Least privilege 

Answer: A,E 

Explanation: 


Q192. A company is looking to reduce the likelihood of employees in the finance department being involved with money laundering. Which of the following controls would BEST mitigate this risk? 

A. Implement privacy policies 

B. Enforce mandatory vacations 

C. Implement a security policy 

D. Enforce time of day restrictions 

Answer:

Explanation: 

A mandatory vacation policy requires all users to take time away from work to refresh. And in the same time it also gives the company a chance to make sure that others can fill in any gaps in skills and satisfy the need to have replication or duplication at all levels in addition to affording the company an opportunity to discover fraud for when others do the same job in the absence of the regular staff member then there is transparency. 


Q193. During a disaster recovery planning session, a security administrator has been tasked with determining which threats and vulnerabilities pose a risk to the organization. Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organization? 

A. Hostile takeovers 

B. Large scale natural disasters 

C. Malware and viruses 

D. Corporate espionage 

Answer:

Explanation: 


Q194. Which of the following is a difference between TFTP and FTP? 

A. TFTP is slower than FTP. 

B. TFTP is more secure than FTP. 

C. TFTP utilizes TCP and FTP uses UDP. 

D. TFTP utilizes UDP and FTP uses TCP. 

Answer:

Explanation: 

FTP employs TCP ports 20 and 21 to establish and maintain client-to-server communications, whereas TFTP makes use of UDP port 69. 


Q195. Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO’s office with various connected cables from the office. Which of the following describes the type of attack that was occurring? 

A. Spear phishing 

B. Packet sniffing 

C. Impersonation 

D. MAC flooding 

Answer:

Explanation: 

A Protocol Analyzer is a hardware device or more commonly a software program used to capture network data communications sent between devices on a network. Capturing packets sent from a computer system is known as packet sniffing. However, packet sniffing requires a physical connection to the network. The switch hidden in the ceiling is used to provide the physical connection to the network. Well known software protocol analyzers include Message Analyzer (formerly Network Monitor) from Microsoft and Wireshark (formerly Ethereal). 

A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If computers are connected to a local area network that is not filtered or switched, the traffic can be broadcast to all computers contained in the same segment. This doesn’t generally occur, since computers are generally told to ignore all the comings and goings of traffic from other computers. However, in the case of a sniffer, all traffic is shared when the sniffer software commands the Network Interface Card (NIC) to stop ignoring the traffic. The NIC is put into promiscuous mode, and it reads communications between computers within a particular segment. This allows the sniffer to seize everything that is flowing in the network, which can lead to the unauthorized access of sensitive data. A packet sniffer can take the form of either a hardware or software solution. A sniffer is also known as a packet analyzer. 


Renovate SY0-401 testing engine:

Q196. Which of the following protocols is the security administrator observing in this packet capture? 

12:33:43, SRC 192.168.4.3:3389, DST 10.67.33.20:8080, SYN/ACK 

A. HTTPS 

B. RDP 

C. HTTP 

D. SFTP 

Answer:

Explanation: 

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides 

a user with a graphical interface to connect to another computer over a network connection. 

Example of RDP tracing output: 

No. Time Delta Source Destination Protocol Length Info 

5782, 2013-01-06 09:52:15.407, 0.000 , SRC 10.7.3.187 , DST 10.0.107.58, TCP, 62, 3389 > 

59193 [SYN, ACK] 


Q197. Layer 7 devices used to prevent specific types of html tags are called: 

A. Firewalls 

B. Content filters 

C. Routers 

D. NIDS 

Answer:

Explanation: 

A content filter is a is a type of software designed to restrict or control the content a reader is authorised to access, particularly when used to limit material delivered over the Internet via the Web, e-mail, or other means. Because the user and the OSI layer interact directly with the content filter, it operates at Layer 7 of the OSI model. 


Q198. At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access? 

A. Configure an access list. 

B. Configure spanning tree protocol. 

C. Configure port security. 

D. Configure loop protection. 

Answer:

Explanation: 

Port security in IT can mean several things. It can mean the physical control of all connection points, such as RJ-45 wall jacks or device ports, so that no unauthorized users or unauthorized devices can attempt to connect into an open port. This can be accomplished by locking down the wiring closet and server vaults and then disconnecting the workstation run from the patch panel (or punch-down block) that leads to a room’s wall jack. Any unneeded or unused wall jacks can (and should) be physically disabled in this manner. Another option is to use a smart patch panel that can monitor the MAC address of any device connected to each and every wall port across a building and detect not just when a new device is connected to an empty port, but also when a valid device is disconnected or replaced by an invalid device. 


Q199. Which of the following are restricted to 64-bit block sizes? (Select TWO). 

A. PGP 

B. DES 

C. AES256 

D. RSA 

E. 3DES 

F. AES 

Answer: B,E 

Explanation: 

B: The Data Encryption Standard (DES) has been used since the mid-1970s. It was the primary standard used in government and industry until it was replaced by AES. It’s based on a 56-bit key and has several modes that offer security and integrity. It is now considered insecure because of the small key size. 

E: Triple-DES (3DES) is a technological upgrade of DES. 3DES is still used, even though AES is the preferred choice for government applications. 3DES is considerably harder to break than many other systems, and it’s more secure than DES. It increases the key length to 168 bits (using three 56-bit DES keys). 


Q200. The Chief Information Officer (CIO) is concerned with moving an application to a SaaS cloud provider. Which of the following can be implemented to provide for data confidentiality assurance during and after the migration to the cloud? 

A. HPM technology 

B. Full disk encryption 

C. DLP policy 

D. TPM technology 

Answer:

Explanation: 

Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data. The Software as a Service (SaaS) applications are remotely run over the Web and as such requires DLP monitoring.