getcertified4sure.com

Refined SY0-401 questions Reviews & Tips




Our The idea experts dedicate for you to keeping the CompTIA CompTIA practice questions and also answers up-to-date. You should preserve visit Examcollection.com regularly to make certain if there are a number of changes in our CompTIA SY0-401 exam products. Along with download the newest CompTIA SY0-401 practice questions timely. You will end up being well prepared for your CompTIA CompTIA real exam along with our CompTIA Pdf simulation components.

2021 Apr SY0-401 exam answers

Q191. Which of the following describes a type of malware which is difficult to reverse engineer in a virtual lab? 

A. Armored virus 

B. Polymorphic malware 

C. Logic bomb 

D. Rootkit 

Answer:

Explanation: 

An armored virus is a type of virus that has been designed to thwart attempts by analysts from examining its code by using various methods to make tracing, disassembling and reverse engineering more difficult. An Armored Virus may also protect itself from antivirus programs, making it more difficult to trace. To do this, the Armored Virus attempts to trick the antivirus program into believing its location is somewhere other than where it really is on the system. 


Q192. Which of the following should be used to authenticate and log connections from wireless users connecting with EAP-TLS? 

A. Kerberos 

B. LDAP 

C. SAML 

D. RADIUS 

Answer:

Explanation: 


Q193. A company has two server administrators that work overnight to apply patches to minimize disruption to the company. With the limited working staff, a security engineer performs a risk assessment to ensure the protection controls are in place to monitor all assets including the administrators in case of an emergency. Which of the following should be in place? 

A. NIDS 

B. CCTV 

C. Firewall 

D. NIPS 

Answer:

Explanation: 


Q194. Which of the following types of application attacks would be used to identify malware causing security breaches that have NOT yet been identified by any trusted sources? 

A. Zero-day 

B. LDAP injection 

C. XML injection 

D. Directory traversal 

Answer:

Explanation: 

The security breaches have NOT yet been identified. This is zero day vulnerability. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. 


Q195. Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO). 

A. 10.4.4.125 

B. 10.4.4.158 

C. 10.4.4.165 

D. 10.4.4.189 

E. 10.4.4.199 

Answer: C,D 

Explanation: 

With the given subnet mask, a maximum number of 30 hosts between IP addresses 10.4.4.161 and 10.4.4.190 are allowed. Therefore, option C and D would be hosts on the same subnet, and the other options would not. 

References: http://www.subnetonline.com/pages/subnet-calculators/ip-subnet-calculator.php 


Leading SY0-401 simulations:

Q196. Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company? 

A. Vulnerability scanner 

B. Honeynet 

C. Protocol analyzer 

D. Port scanner 

Answer:

Explanation: 

The Internet hosts used to gather data on new malware are known as honeypots. A collection of honeypots is known as a honeynet. A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. The Honeynet Project, a non-profit research organization dedicated to computer security and information sharing, actively promotes the deployment of honeynets. In addition to the honey pots, a honeynet usually has real applications and services so that it seems like a normal network and a worthwhile target. However, because the honeynet doesn't actually serve any authorized users, any attempt to contact the network from without is likely an illicit attempt to breach its security, and any outbound activity is likely evidence that a system has been compromised. For this reason, the suspect information is much more apparent than it would be in an actual network, where it would have to be found amidst all the legitimate network data. Applications within a honeynet are often given names such as "Finances" or "Human Services" to make them sound appealing to the attacker. 

A virtual honeynet is one that, while appearing to be an entire network, resides on a single server. 


Q197. Which of the following application security principles involves inputting random data into a program? 

A. Brute force attack 

B. Sniffing 

C. Fuzzing 

D. Buffer overflow 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Q198. An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal? 

A. Unified Threat Management 

B. Virtual Private Network 

C. Single sign on 

D. Role-based management 

Answer:

Explanation: 

When you combine a firewall with other abilities (intrusion prevention, antivirus, content filtering, etc.), what used to be called an all-in-one appliance is now known as a unified threat management (UTM) system. The advantages of combining everything into one include a reduced learning curve (you only have one product to learn), a single vendor to deal with, and—typically—reduced complexity. 


Q199. A company’s employees were victims of a spear phishing campaign impersonating the CEO. The company would now like to implement a solution to improve the overall security posture by assuring their employees that email originated from the CEO. Which of the following controls could they implement to BEST meet this goal? 

A. Spam filter 

B. Digital signatures 

C. Antivirus software 

D. Digital certificates 

Answer:

Explanation: 

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. The digital equivalent of a handwritten signature or stamped seal, but offering far more inherent security, a digital signature is intended to solve the problem of tampering and impersonation in digital communications. Digital signatures can provide the added assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed consent by the signer. Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing. 


Q200. After a new firewall has been installed, devices cannot obtain a new IP address. Which of the following ports should Matt, the security administrator, open on the firewall? 

A. 25 

B. 68 

C. 80 

D. 443 

Answer:

Explanation: 

The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for distributing IP addresses for interfaces and services. DHCP makes use of port 68.