SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(29640 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA SY0-401 Free Practice Questions

Q1. A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue? 

A. The SSID broadcast is disabled. 

B. The company is using the wrong antenna type. 

C. The MAC filtering is disabled on the access point. 

D. The company is not using strong enough encryption. 

Answer:

Explanation: 

When the SSID is broadcast, any device with an automatic detect and connect feature is able to see the network and can initiate a connection with it. The fact that they cannot access the network means that they are unable to see it. 

Q2. A company has just deployed a centralized event log storage system. Which of the following can be used to ensure the integrity of the logs after they are collected? 

A. Write-once drives 

B. Database encryption 

C. Continuous monitoring 

D. Role-based access controls 

Answer:

Explanation: 

Q3. An organization processes credit card transactions and is concerned that an employee may intentionally email credit card numbers to external email addresses. This company should consider which of the following technologies? 

A. IDS 

B. Firewalls 

C. DLP 

D. IPS 

Answer:

Explanation: 

Q4. A malicious program modified entries in the LMHOSTS file of an infected system. Which of the following protocols would have been affected by this? 

A. ICMP 

B. BGP 

C. NetBIOS 

D. DNS 

Answer:

Explanation: 

The LMHOSTS file provides a NetBIOS name resolution method that can be used for small networks that do not use a WINS server. NetBIOS has been adapted to run on top of TCP/IP, and is still extensively used for name resolution and registration in Windows-based environments. 

Q5. Which of the following concepts describes the use of a one way transformation in order to validate the integrity of a program? 

A. Hashing 

B. Key escrow 

C. Non-repudiation 

D. Steganography 

Answer:

Explanation: 

Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash 

tables and its main characteristics are: 

It must be one-way – it is not reversible. 

Variable-length input produces fixed-length output – whether you have two characters or 2 million, 

the hash size is the same. 

The algorithm must have few or no collisions – in hashing two different inputs does not give the 

same output. 

Q6. Which of the following is a security benefit of providing additional HVAC capacity or increased tonnage in a datacenter? 

A. Increased availability of network services due to higher throughput 

B. Longer MTBF of hardware due to lower operating temperatures 

C. Higher data integrity due to more efficient SSD cooling 

D. Longer UPS run time due to increased airflow 

Answer:

Explanation: 

The mean time between failures (MTBF) is the measure of the anticipated incidence of failure for a system or component. This measurement determines the component’s anticipated lifetime. If the MTBF of a cooling system is one year, you can anticipate that the system will last for a one-year period; this means that you should be prepared to replace or rebuild the system once a year. If the system lasts longer than the MTBF, your organization receives a bonus. MTBF is helpful in evaluating a system’s reliability and life expectancy. Thus longer MTBF due to lower operating temperatures is a definite advantage 

Q7. Which of the following devices is used for the transparent security inspection of network traffic by redirecting user packets prior to sending the packets to the intended destination? 

A. Proxies 

B. Load balancers 

C. Protocol analyzer 

D. VPN concentrator 

Answer:

Explanation: 

Q8. A company has decided to move large data sets to a cloud provider in order to limit the costs of new infrastructure. Some of the data is sensitive and the Chief Information Officer wants to make sure both parties have a clear understanding of the controls needed to protect the data. 

Which of the following types of interoperability agreement is this? 

A. ISA 

B. MOU 

C. SLA 

D. BPA 

Answer:

Explanation: 

ISA/ Interconnection Security Agreement is an agreement between two organizations that have connected systems. The agreement documents the technical requirements of the connected systems. 

Q9. Which of the following devices is BEST suited for servers that need to store private keys? 

A. Hardware security module 

B. Hardened network firewall 

C. Solid state disk drive 

D. Hardened host firewall 

Answer:

Explanation: 

A hardware security module (HSM) is a physical computing device that safeguards and manages 

digital keys for strong authentication and provides cryptoprocessing. 

By adding a HSM to the server and storing the private keys on HSM, the security of the keys 

would be improved. 

Q10. Corporate IM presents multiple concerns to enterprise IT. Which of the following concerns should Jane, the IT security manager, ensure are under control? (Select THREE). 

A. Authentication 

B. Data leakage 

C. Compliance 

D. Malware 

E. Non-repudiation 

F. Network loading 

Answer: B,C,D 

Explanation: 

In a joint enterprise, data may be combined from both organizations. It must be determined, in advance, who is responsible for that data and how the data backups will be managed. Data leakage, compliance and Malware issues are all issues concerning data ownership and backup which are both impacted on by corporate IM. 

Q11. Ann, a security analyst, is preparing for an upcoming security audit. To ensure that she identifies unapplied security controls and patches without attacking or compromising the system, Ann would use which of the following? 

A. Vulnerability scanning 

B. SQL injection 

C. Penetration testing 

D. Antivirus update 

Answer:

Explanation: 

A vulnerability scan is the process of scanning the network and/or I.T. infrastructure for threats and vulnerabilities. The threats and vulnerabilities are then evaluated in a risk assessment and the necessary actions taken to resolve and vulnerabilities. A vulnerability scan scans for known weaknesses such as missing patches or security updates. 

A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. 

Q12. An administrator is looking to implement a security device which will be able to not only detect network intrusions at the organization level, but help defend against them as well. Which of the following is being described here? 

A. NIDS 

B. NIPS 

C. HIPS 

D. HIDS 

Answer:

Explanation: 

Network-based intrusion prevention system (NIPS) monitors the entire network for suspicious traffic by analyzing protocol activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it 

Q13. A security analyst needs to ensure all external traffic is able to access the company’s front-end servers but protect all access to internal resources. Which of the following network design elements would MOST likely be recommended? 

A. DMZ 

B. Cloud computing 

C. VLAN 

D. Virtualization 

Answer:

Explanation: 

A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall. 

Q14. Which of the following is the GREATEST security risk of two or more companies working together under a Memorandum of Understanding? 

A. Budgetary considerations may not have been written into the MOU, leaving an entity to absorb more cost than intended at signing. 

B. MOUs have strict policies in place for services performed between the entities and the penalties for compromising a partner are high. 

C. MOUs are generally loose agreements and therefore may not have strict guidelines in place to protect sensitive data between the two entities. 

D. MOUs between two companies working together cannot be held to the same legal standards as SLAs. 

Answer:

Explanation: 

The Memorandum of Understanding This document is used in many settings in the information industry. It is a brief summary of which party is responsible for what portion of the work. For example, Company A may be responsible for maintaining the database server and Company B may be responsible for telecommunications. MOUs are not legally binding but they carry a degree of seriousness and mutual respect, stronger than a gentlemen’s agreement. Often, MOUs are the first steps towards a legal contract. 

Q15. After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation? 

A. Information Security Awareness 

B. Social Media and BYOD 

C. Data Handling and Disposal 

D. Acceptable Use of IT Systems 

Answer:

Explanation: 

Education and training with regard to Information Security Awareness will reduce the risk of data leaks and as such forms an integral part of Security Awareness. By employing social engineering data can be leaked by employees and only when company users are made aware of the methods of social engineering via Information Security Awareness Training, you can reduce the risk of data leaks.