getcertified4sure.com

Beginners Guide: comptia security+ sy0 401 pdf




Want to know Ucertify comptia sy0 401 Exam practice test features? Want to lear more about CompTIA CompTIA Security+ Certification certification experience? Study 100% Guarantee CompTIA comptia security+ study guide sy0 401 answers to Replace sy0 401 braindump questions at Ucertify. Gat a success with an absolute guarantee to pass CompTIA comptia security+ study guide sy0 401 (CompTIA Security+ Certification) test on your first attempt.

Q11. In order to prevent and detect fraud, which of the following should be implemented? 

A. Job rotation 

B. Risk analysis 

C. Incident management 

D. Employee evaluations 

Answer:

Explanation: 

A job rotation policy defines intervals at which employees must rotate through positions. Similar in purpose to mandatory vacations, it helps to ensure that the company does not become too dependent on one person and it does afford the company with the opportunity to place another person in that same job and in this way the company can potentially uncover any fraud perhaps committed by the incumbent. 


Q12. Which of the following will help prevent smurf attacks? 

A. Allowing necessary UDP packets in and out of the network 

B. Disabling directed broadcast on border routers 

C. Disabling unused services on the gateway firewall 

D. Flash the BIOS with the latest firmware 

Answer:

Explanation: 

A smurf attack involves sending PING requests to a broadcast address. Therefore, we can prevent smurf attacks by blocking broadcast packets on our external routers. A smurf attack is a type of network security breach in which a network connected to the Internet is swamped with replies to ICMP echo (PING) requests. A smurf attacker sends PING requests to an Internet broadcast address. These are special addresses that broadcast all received messages to the hosts connected to the subnet. Each broadcast address can support up to 255 hosts, so a single PING request can be multiplied 255 times. The return address of the request itself is spoofed to be the address of the attacker's victim. All the hosts receiving the PING request reply to this victim's address instead of the real sender's address. A single attacker sending hundreds or thousands of these PING messages per second can fill the victim's T-1 (or even T-3) line with ping replies, bring the entire Internet service to its knees. Smurfing falls under the general category of Denial of Service attacks -- security attacks that don't try to steal information, but instead attempt to disable a computer or network. 


Q13. A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them to customer PCs. Which of the following should the administrator use to test the patching process quickly and often? 

A. Create an incremental backup of an unpatched PC 

B. Create an image of a patched PC and replicate it to servers 

C. Create a full disk image to restore after each installation 

D. Create a virtualized sandbox and utilize snapshots 

Answer:

Explanation: 


Q14. Which of the following are examples of network segmentation? (Select TWO). 

A. IDS 

B. IaaS 

C. DMZ 

D. Subnet 

E. IPS 

Answer: C,D 

Explanation: 

C:

 A demilitarized zone (DMZ) is a part of the network that is separated of segmented from the rest of the network by means of firewalls and acts as a buffer between the untrusted public Internet and the trusted local area network (LAN). 

D.

 IP subnets can be used to separate or segment networks while allowing communication between the network segments via routers. 


Q15. Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway? 

A. Wireless jamming 

B. Evil twin 

C. Rogue AP 

D. Packet sniffing 

Answer:

Explanation: 

When most people think of frequency jamming, what comes to mind are radio, radar and cell phone jamming. However, any communication that uses radio frequencies can be jammed by a strong radio signal in the same frequency. In this manner, Wi-Fi may be attacked with a network jamming attack, reducing signal quality until it becomes unusable or disconnects occur. With very similar methods, a focused and aimed signal can actually break access point hardware, as with equipment destruction attacks. 


Q16. In which of the following steps of incident response does a team analyse the incident and determine steps to prevent a future occurrence? 

A. Mitigation 

B. Identification 

C. Preparation 

D. Lessons learned 

Answer:

Explanation: 

Incident response procedures involves in chronological order: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Thus lessons are only learned after the mitigation occurred. For only then can you ‘step back’ and analyze the incident to prevent the same occurrence in future. 


Q17. A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed? 

A. The request needs to be sent to the incident management team. 

B. The request needs to be approved through the incident management process. 

C. The request needs to be approved through the change management process. 

D. The request needs to be sent to the change management team. 

Answer:

Explanation: 

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. Thus the actual switch configuration should first be subject to the change management approval. 


Q18. Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server? 

A. SSLv2 

B. SSHv1 

C. RSA 

D. TLS 

Answer:

Explanation: 

HTTP Secure HTTP Secure (HTTPS) is the protocol used for “secure” web pages that users should see when they must enter personal information such as credit card numbers, passwords, and other identifiers. It combines HTTP with SSL/TLS to provide encrypted communication. Transport Layer Security (TLS) is a security protocol that expands upon SSL. Many industry analysts predict that TLS will replace SSL, and it is also referred to as SSL 3.1. 


Q19. Joe, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Joe insisted that he was not aware of any company policy that prohibits the use of such web sites. Which of the following is the BEST method to deter employees from the improper use of the company’s information systems? 

A. Acceptable Use Policy 

B. Privacy Policy 

C. Security Policy 

D. Human Resource Policy 

Answer:

Explanation: 

Acceptable use policies (AUPs) describe how the employees in an organization can use company systems and resources, both software and hardware. 


Q20. A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need access to sales. Which of the following should be implemented to give the appropriate access while enforcing least privilege? 

A. Assign individual permissions to users 1 and 2 for payroll. Assign individual permissions to users 4 and 5 for sales. Make user 3 an administrator. 

B. Make all users administrators and then restrict users 1 and 2 from sales. Then restrict users 4 and 5 from payroll. 

C. Create two additional generic accounts, one for payroll and one for sales that users utilize. 

D. Create a sales group with users 3, 4 and 5. Create a payroll group with users 1, 2 and 3. 

Answer:

Explanation: