SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(3180 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA SY0-401 Free Practice Questions

Q1. An administrator configures all wireless access points to make use of a new network certificate authority. Which of the following is being used? 

A. WEP 

B. LEAP 

C. EAP-TLS 

D. TKIP 

Answer:

Explanation: 

The majority of the EAP-TLS implementations require client-side X.509 certificates without giving the option to disable the requirement. 

Q2. Which of the following would be MOST appropriate to secure an existing SCADA system by preventing connections from unauthorized networks? 

A. Implement a HIDS to protect the SCADA system 

B. Implement a Layer 2 switch to access the SCADA system 

C. Implement a firewall to protect the SCADA system 

D. Implement a NIDS to protect the SCADA system 

Answer:

Explanation: 

Q3. A server dedicated to the storage and processing of sensitive information was compromised with a rootkit and sensitive data was extracted. Which of the following incident response procedures is best suited to restore the server? 

A. Wipe the storage, reinstall the OS from original media and restore the data from the last known good backup. 

B. Keep the data partition, restore the OS from the most current backup and run a full system antivirus scan. 

C. Format the storage and reinstall both the OS and the data from the most current backup. 

D. Erase the storage, reinstall the OS from most current backup and only restore the data that was not compromised. 

Answer:

Explanation: 

Rootkits are software programs that have the ability to hide certain things from the operating system. With a rootkit, there may be a number of processes running on a system that do not show up in Task Manager or connections established or available that do not appear in a netstat display—the rootkit masks the presence of these items. The rootkit is able to do this by manipulating function calls to the operating system and filtering out information that would normally appear. Theoretically, rootkits could hide anywhere that there is enough memory to reside: video cards, PCI cards, and the like. The best way to handle this situation is to wipe the server and reinstall the operating system with the original installation disks and then restore the extracted data from your last known good backup. This way you can eradicate the rootkit and restore the data. 

Q4. Who should be contacted FIRST in the event of a security breach? 

A. Forensics analysis team 

B. Internal auditors 

C. Incident response team 

D. Software vendors 

Answer:

Explanation: 

A security breach is an incident and requires a response. The incident response team would be better equipped to deal with any incident insofar as all their procedures are concerned. Their procedures in addressing incidents are: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. 

Q5. The process of making certain that an entity (operating system, application, etc.) is as secure as it can be is known as: 

A. Stabilizing 

B. Reinforcing 

C. Hardening 

D. Toughening 

Answer:

Explanation: 

Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing unnecessary functions and features, removing unnecessary usernames or logins and disabling unnecessary services. 

Q6. Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware? 

A. Logic bomb 

B. Worm 

C. Trojan 

D. Adware 

Answer:

Explanation: 

In computers, a Trojan is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. 

Q7. A security analyst discovered data such as images and word documents hidden within different types of files. Which of the following cryptographic concepts describes what was discovered? 

A. Symmetric encryption 

B. Non-repudiation 

C. Steganography 

D. Hashing 

Answer:

Explanation: 

Steganography is the process of concealing a file, message, image, or video within another file, message, image, or video. Note: The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable will arouse interest, and may in themselves be incriminating in countries where encryption is illegal. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. 

Q8. Joe, the systems administrator, is setting up a wireless network for his team’s laptops only and needs to prevent other employees from accessing it. Which of the following would BEST address this? 

A. Disable default SSID broadcasting. 

B. Use WPA instead of WEP encryption. 

C. Lower the access point’s power settings. 

D. Implement MAC filtering on the access point. 

Answer:

Explanation: 

If MAC filtering is turned off, any wireless client that knows the values looked for (MAC addresses) can join the network. When MAC filtering is used, the administrator compiles a list of the MAC addresses associated with users’ computers and enters those addresses. When a client attempts to connect and other values have been correctly entered, an additional check of the MAC address is done. If the address appears in the list, the client is allowed to join; otherwise, it is forbidden from doing so. 

Q9. Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash? 

A. Input validation 

B. Exception handling 

C. Application hardening 

D. Fuzzing 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 

Q10. Joe, an administrator, installs a web server on the Internet that performs credit card transactions for customer payments. Joe also sets up a second web server that looks like the first web server. 

However, the second server contains fabricated files and folders made to look like payments were processed on this server but really were not. Which of the following is the second server? 

A. DMZ 

B. Honeynet 

C. VLAN 

D. Honeypot 

Answer:

Explanation: 

In this scenario, the second web server is a ‘fake’ webserver designed to attract attacks. We can then monitor the second server to view the attacks and then ensure that the ‘real’ web server is secure against such attacks. The second web server is a honeypot. 

A honeypot is a system whose purpose it is to be attacked. An administrator can watch and study the attack to research current attack methodologies. 

According to the Wepopedia.com, a Honeypot luring a hacker into a system has several main purposes: 

The administrator can watch the hacker exploit the vulnerabilities of the system, thereby learning 

where the system has weaknesses that need to be redesigned. 

The hacker can be caught and stopped while trying to obtain root access to the system. 

By studying the activities of hackers, designers can better create more secure systems that are 

potentially invulnerable to future hackers. 

There are two main types of honeypots: 

Production - A production honeypot is one used within an organization's environment to help 

mitigate risk. 

Research – A research honeypot add value to research in computer security by providing a 

platform to study the threat. 

Q11. Which of the following ciphers would be BEST used to encrypt streaming video? 

A. RSA 

B. RC4 

C. SHA1 D. 3DES 

Answer:

Explanation: 

In cryptography, RC4 is the most widely used software stream cipher and is used in popular Internet protocols such as Transport Layer Security (TLS). While remarkable for its simplicity and speed in software, RC4 has weaknesses that argue against its use in new systems. It is especially vulnerable when the beginning of the output keystream is not discarded, or when nonrandom or related keys are used; some ways of using RC4 can lead to very insecure protocols such as WEP. 

Because RC4 is a stream cipher, it is more malleable than common block ciphers. If not used together with a strong message authentication code (MAC), then encryption is vulnerable to a bit-flipping attack. The cipher is also vulnerable to a stream cipher attack if not implemented correctly. Furthermore, inadvertent double encryption of a message with the same key may accidentally output plaintext rather than ciphertext because the involutory nature of the XOR function would result in the second operation reversing the first. It is noteworthy, however, that RC4, being a stream cipher, was for a period of time the only common cipher that was immune to the 2011 BEAST attack on TLS 1.0. The attack exploits a known weakness in the way cipher block chaining mode is used with all of the other ciphers supported by TLS 1.0, which are all block ciphers. 

Q12. Which of the following BEST describes part of the PKI process? 

A. User1 decrypts data with User2’s private key 

B. User1 hashes data with User2’s public key 

C. User1 hashes data with User2’s private key 

D. User1 encrypts data with User2’s public key 

Answer:

Explanation: 

In a PKI the sender encrypts the data using the receiver's public key. The receiver decrypts the 

data using his own private key. 

PKI is a two-key, asymmetric system with four main components: certificate authority (CA), 

registration authority (RA), RSA (the encryption algorithm), and digital certificates. Messages are 

encrypted with a public key and decrypted with a private key. 

A PKI example: 

1.

 You want to send an encrypted message to Jordan, so you request his public key. 

2.

 Jordan responds by sending you that key. 

3.

 You use the public key he sends you to encrypt the message. 

4.

 You send the message to him. 

5.

 Jordan uses his private key to decrypt the message. 

Q13. Several departments within a company have a business need to send high volumes of confidential information to customers via email. Which of the following is the BEST solution to mitigate unintentional exposure of confidential information? 

A. Employ encryption on all outbound emails containing confidential information. 

B. Employ exact data matching and prevent inbound emails with Data Loss Prevention. 

C. Employ hashing on all outbound emails containing confidential information. 

D. Employ exact data matching and encrypt inbound e-mails with Data Loss Prevention. 

Answer:

Explanation: 

Encryption is used to ensure the confidentiality of information and in this case the outbound email that contains the confidential information should be encrypted. 

Q14. Which of the following would a security administrator implement in order to identify change from the standard configuration on a server? 

A. Penetration test 

B. Code review 

C. Baseline review 

D. Design review 

Answer:

Explanation: 

The standard configuration on a server is known as the baseline. 

The IT baseline protection approach is a methodology to identify and implement computer security 

measures in an organization. The aim is the achievement of an adequate and appropriate level of 

security for IT systems. This is known as a baseline. 

A baseline report compares the current status of network systems in terms of security updates, 

performance or other metrics to a predefined set of standards (the baseline). 

Q15. Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to the building. Sara then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the following attacks occurred LAST? 

A. Phishing 

B. Shoulder surfing 

C. Impersonation 

D. Tailgating 

Answer:

Explanation: 

Two attacks took place in this question. The first attack was shoulder surfing. This was the act of Sara recording a person typing in their ID number into a keypad to gain access to the building. The second attack was impersonation. Sara called the helpdesk and used the PIN to impersonate the person she recorded.