getcertified4sure.com

Tips to Pass SY0-401 Exam (51 to 60)




We take pleasure in the highest standing for a while in that many of us offer probably the most up-to-date and correct CompTIA CompTIA SY0-401 exam questions and answers. You are able to easily get through the CompTIA SY0-401 actual test with our precise along with logical CompTIA SY0-401 practice questions. Trust upon our CompTIA goods and pass the particular CompTIA exam with ease. You may get 100% success assurance on your first try should you preview and review our CompTIA SY0-401 study materials.

2021 Apr SY0-401 practice test

Q51. A trojan was recently discovered on a server. There are now concerns that there has been a security breach that allows unauthorized people to access data. The administrator should be looking for the presence of a/an: 

A. Logic bomb. 

B. Backdoor. 

C. Adware application. 

D. Rootkit. 

Answer:

Explanation: 

There has been a security breach on a computer system. The security administrator should now check for the existence of a backdoor. A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing unauthorized remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit. A backdoor in a login system might take the form of a hard coded user and password combination which gives access to the system. Although the number of backdoors in systems using proprietary software (software whose source code is not publicly available) is not widely credited, they are nevertheless frequently exposed. Programmers have even succeeded in secretly installing large amounts of benign code as Easter eggs in programs, although such cases may involve official forbearance, if not actual permission. Many computer worms, such as Sobig and Mydoom, install a backdoor on the affected computer (generally a PC on broadband running Microsoft Windows and Microsoft Outlook). Such backdoors appear to be installed so that spammers can send junk e-mail from the infected machines. Others, such as the Sony/BMG rootkit distributed silently on millions of music CDs through late 2005, are intended as DRM measures—and, in that case, as data gathering agents, since both surreptitious programs they installed routinely contacted central servers. 


Q52. Input validation is an important security defense because it: 

A. rejects bad or malformed data. 

B. enables verbose error reporting. 

C. protects mis-configured web servers. 

D. prevents denial of service attacks. 

Answer:

Explanation: 

Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain. 


Q53. An IT security technician is actively involved in identifying coding issues for her company. 

Which of the following is an application security technique that can be used to identify unknown weaknesses within the code? 

A. Vulnerability scanning 

B. Denial of service 

C. Fuzzing 

D. Port scanning 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Q54. An administrator is concerned that a company’s web server has not been patched. Which of the following would be the BEST assessment for the administrator to perform? 

A. Vulnerability scan 

B. Risk assessment 

C. Virus scan 

D. Network sniffer 

Answer:

Explanation: 

A vulnerability scan is the process of scanning the network and/or I.T. infrastructure for threats and vulnerabilities. Vulnerabilities include computer systems that do not have the latest security patches installed. The threats and vulnerabilities are then evaluated in a risk assessment and the necessary actions taken to resolve and vulnerabilities. A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Internet in order to assess the threat of rogue software or malicious employees in an enterprise. 


Q55. Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives? 

A. Degaussing 

B. Physical Destruction 

C. Lock up hard drives in a secure safe 

D. Wipe 

Answer:

Explanation: 

The physical description of hard drives is the only secure means of disposing hard drives. This can include incineration, an acid bath, and crushing. 


Updated SY0-401 free exam:

Q56. Which of the following authentication services should be replaced with a more secure alternative? 

A. RADIUS 

B. TACACS 

C. TACACS+ 

D. XTACACS 

Answer:

Explanation: 

Terminal Access Controller Access-Control System (TACACS) is less secure than XTACACS, which is a proprietary extension of TACACS, and less secure than TACACS+, which replaced TACACS and XTACACS. 


Q57. A security administrator notices that a specific network administrator is making unauthorized changes to the firewall every Saturday morning. Which of the following would be used to mitigate this issue so that only security administrators can make changes to the firewall? 

A. Mandatory vacations 

B. Job rotation 

C. Least privilege 

D. Time of day restrictions 

Answer:

Explanation: 

A least privilege policy is to give users only the permissions that they need to do their work and no more. That is only allowing security administrators to be able to make changes to the firewall by practicing the least privilege principle. 


Q58. A security analyst discovered data such as images and word documents hidden within different types of files. Which of the following cryptographic concepts describes what was discovered? 

A. Symmetric encryption 

B. Non-repudiation 

C. Steganography 

D. Hashing 

Answer:

Explanation: 

Steganography is the process of concealing a file, message, image, or video within another file, message, image, or video. Note: The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable will arouse interest, and may in themselves be incriminating in countries where encryption is illegal. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. 


Q59. An administrator needs to secure RADIUS traffic between two servers. Which of the following is the BEST solution? 

A. Require IPSec with AH between the servers 

B. Require the message-authenticator attribute for each message 

C. Use MSCHAPv2 with MPPE instead of PAP 

D. Require a long and complex shared secret for the servers 

Answer:

Explanation: 


Q60. A security technician is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond? 

A. Rule based access control 

B. Role based access control 

C. Discretionary access control 

D. Mandatory access control 

Answer:

Explanation: 

Rule-based access control is used for network devices, such as firewalls and routers, which filter traffic based on filtering rules.