getcertified4sure.com

All About SY0-401 exam question Mar 2021




Proper study guides for Abreast of the times CompTIA CompTIA Security+ Certification certified begins with CompTIA SY0-401 preparation products which designed to deliver the High quality SY0-401 questions by making you pass the SY0-401 test at your first time. Try the free SY0-401 demo right now.

2021 Mar SY0-401 download

Q511. Which of the following is BEST utilized to identify common misconfigurations throughout the enterprise? 

A. Vulnerability scanning 

B. Port scanning 

C. Penetration testing 

D. Black box 

Answer:

Explanation: 

A vulnerability scan is the process of scanning the network and/or I.T. infrastructure for threats and vulnerabilities. The threats and vulnerabilities are then evaluated in a risk assessment and the necessary actions taken to resolve and vulnerabilities. A vulnerability scan scans for known weaknesses such as missing patches or security updates. 

A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. 


Q512. A company wants to ensure that all aspects if data are protected when sending to other sites within the enterprise. Which of the following would ensure some type of encryption is performed while data is in transit? 

A. SSH 

B. SHA1 

C. TPM 

D. MD5 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Q513. Encryption of data at rest is important for sensitive information because of which of the following? 

A. Facilitates tier 2 support, by preventing users from changing the OS 

B. Renders the recovery of data harder in the event of user password loss 

C. Allows the remote removal of data following eDiscovery requests 

D. Prevents data from being accessed following theft of physical equipment 

Answer:

Explanation: 

Data encryption allows data that has been stolen to remain out of the eyes of the intruders who took it as long as they do not have the proper passwords. 


Q514. A company administrator has a firewall with an outside interface connected to the Internet and an inside interface connected to the corporate network. Which of the following should the administrator configure to redirect traffic destined for the default HTTP port on the outside interface to an internal server listening on port 8080? 

A. Create a dynamic PAT from port 80 on the outside interface to the internal interface on port 8080 

B. Create a dynamic NAT from port 8080 on the outside interface to the server IP address on port 80 

C. Create a static PAT from port 80 on the outside interface to the internal interface on port 8080 

D. Create a static PAT from port 8080 on the outside interface to the server IP address on port 80 

Answer:

Explanation: 


Q515. A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic. 

Which of the following would accomplish this task? 

A. Deny TCP port 68 

B. Deny TCP port 69 

C. Deny UDP port 68 

D. Deny UDP port 69 

Answer:

Explanation: 

Trivial File Transfer Protocol (TFTP) is a simple file-exchange protocol that doesn’t require authentication. It operates on UDP port 69. 


Down to date SY0-401 test:

Q516. Which of the following is an important step in the initial stages of deploying a host-based firewall? 

A. Selecting identification versus authentication 

B. Determining the list of exceptions 

C. Choosing an encryption algorithm 

D. Setting time of day restrictions 

Answer:

Explanation: 

A host-based firewall is installed on a client system and is used to protect the client system from the activities of the user as well as from communication from the network or Internet. These firewalls manage network traffic using filters to block certain ports and protocols while allowing others to pass through the system. 


Q517. Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent penetration test reveals vulnerabilities on the network. Which of the following has been reported by the vulnerability scan? 

A. Passive scan 

B. Active scan 

C. False positive 

D. False negative 

Answer:

Explanation: 


Q518. Which of the following allows an organization to store a sensitive PKI component with a trusted third party? 

A. Trust model 

B. Public Key Infrastructure 

C. Private key 

D. Key escrow 

Answer:

Explanation: 

Sensitive PKI data, such as private keys, can be put into key escrow data. The key escrow data can be kept at a trusted third party. 

Key escrow is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may include businesses, who may want access to employees' private communications, or governments, who may wish to be able to view the contents of encrypted communications. 


Q519. Ann, a security administrator, has concerns regarding her company’s wireless network. The network is open and available for visiting prospective clients in the conference room, but she notices that many more devices are connecting to the network than should be. 

Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality for clients? 

A. Enable MAC filtering on the wireless access point. 

B. Configure WPA2 encryption on the wireless access point. 

C. Lower the antenna’s broadcasting power. 

D. Disable SSID broadcasting. 

Answer:

Explanation: 

Some access points include power level controls that allow you to reduce the amount of output provided if the signal is traveling too far. 


Q520. Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms? 

A. Signature based IPS 

B. Signature based IDS 

C. Application based IPS 

D. Anomaly based IDS 

Answer:

Explanation: 

Most intrusion detection systems (IDS) are what is known as signature-based. This means that they operate in much the same way as a virus scanner, by searching for a known identity - or signature - for each specific intrusion event. And, while signature-based IDS is very efficient at sniffing out known s of attack, it does, like anti-virus software, depend on receiving regular signature updates, to keep in touch with variations in hacker technique. In other words, signature-based IDS is only as good as its database of stored signatures. Any organization wanting to implement a more thorough - and hence safer - solution, should consider what we call anomaly-based IDS. By its nature, anomaly-based IDS is a rather more complex creature. In network traffic terms, it captures all the headers of the IP packets running towards the network. From this, it filters out all known and legal traffic, including web traffic to the organization's web server, mail traffic to and from its mail server, outgoing web traffic from company employees and DNS traffic to and from its DNS server. 

There are other equally obvious advantages to using anomaly-based IDS. For example, because it detects any traffic that is new or unusual, the anomaly method is particularly good at identifying sweeps and probes towards network hardware. It can, therefore, give early warnings of potential intrusions, because probes and scans are the predecessors of all attacks. And this applies equally to any new service installed on any item of hardware - for example, Telnet deployed on a network router for maintenance purposes and forgotten about when the maintenance was finished. This makes anomaly-based IDS perfect for detecting anything from port anomalies and web anomalies to mis-formed attacks, where the URL is deliberately mis-typed.