SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(32415 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA SY0-401 Free Practice Questions

Q1. Establishing a published chart of roles, responsibilities, and chain of command to be used during a disaster is an example of which of the following? 

A. Fault tolerance 

B. Succession planning 

C. Business continuity testing 

D. Recovery point objectives 

Answer:

Explanation: 

Succession planning outlines those internal to the organization that has the ability to step into positions when they open. By identifying key roles that cannot be left unfilled and associating internal employees who can step into these roles, you can groom those employees to make sure that they are up to speed when it comes time for them to fill those positions. 

Q2. The Chief Information Officer (CIO) receives an anonymous threatening message that says “beware of the 1st of the year”. The CIO suspects the message may be from a former disgruntled employee planning an attack. 

Which of the following should the CIO be concerned with? 

A. Smurf Attack 

B. Trojan 

C. Logic bomb 

D. Virus 

Answer:

Explanation: 

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files should they ever be terminated from the company. Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as Friday the 13th or April Fool's Day. Trojans that activate on certain dates are often called "time bombs". To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that disables certain functionality after a set time are not normally regarded as logic bombs. 

Q3. During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR). 

A. 21 

B. 22 

C. 23 

D. 69 

E. 3389 

F. SSH 

G. Terminal services 

H. Rlogin 

I. Rsync 

J. Telnet 

Answer: B,C,F,J 

Explanation: 

The question states that Jane was able to establish a connection to an internal router. Typical 

ports and protocols used to connect to a router include the following: 

B, F: Port 22 which is used by SSH (Secure Shell). 

C, J: Port 23 which is used by Telnet. 

SSH and Telnet both provide command line interfaces for administering network devices such as 

routers and switches. 

Q4. Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent? 

A. Buffer overflow 

B. Pop-up blockers 

C. Cross-site scripting 

D. Fuzzing 

Answer:

Explanation: 

Buffer overflow is an exploit at programming error, bugs and flaws. It occurs when an application is fed more input data than it is programmed to handle. This may cause the application to terminate or to write data beyond the end of the allocated space in memory. The termination of the application may cause the system to send the data with temporary access to privileged levels in the system, while overwriting can cause important data to be lost. Proper error and exception handling and input validation will help prevent Buffer overflow exploits. 

Q5. Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO). 

A. Tethering 

B. Screen lock PIN 

C. Remote wipe 

D. Email password 

E. GPS tracking 

F. Device encryption 

Answer: C,F 

Explanation: 

C: Remote wipe is the process of deleting data on a device in the event that the device is stolen. This is performed over remote connections such as the mobile phone service or the internet connection and helps ensure that sensitive data is not accessed by unauthorized people. 

F: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. 

Q6. What is the term for the process of luring someone in (usually done by an enforcement officer or a government agent)? 

A. Enticement 

B. Entrapment 

C. Deceit 

D. Sting 

Answer:

Explanation: 

Enticement is the process of luring someone into your plan or trap. 

Q7. Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on employees' computers? 

A. Least privilege accounts 

B. Host-based firewalls 

C. Intrusion Detection Systems 

D. Application white listing 

Answer:

Explanation: 

Q8. The datacenter design team is implementing a system, which requires all servers installed in racks to face in a predetermined direction. AN infrared camera will be used to verify that servers are properly racked. Which of the following datacenter elements is being designed? 

A. Hot and cold aisles 

B. Humidity control 

C. HVAC system 

D. EMI shielding 

Answer:

Explanation: 

There are often multiple rows of servers located in racks in server rooms. The rows of servers are known as aisles, and they can be cooled as hot aisles and cold aisles. With a hot aisle, hot air outlets are used to cool the equipment, whereas with cold aisles, cold air intake is used to cool the equipment. Combining the two, you have cold air intake from below the aisle and hot air outtake above it, providing constant circulation. Infrared cameras are heat detection measures thus it is hot and cold aisle design elements. 

Q9. A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP address in a foreign country. An investigation determines that the firewall has not been altered, and antivirus is up-to-date on the workstation. Which of the following is the MOST likely reason for the incident? 

A. MAC Spoofing 

B. Session Hijacking 

C. Impersonation 

D. Zero-day 

Answer:

Explanation: 

Q10. In PKI, a key pair consists of: (Select TWO). 

A. A key ring 

B. A public key 

C. A private key 

D. Key escrow 

E. A passphrase 

Answer: B,C 

Explanation: 

In a PKI the sender encrypts the data using the receiver's public key. The receiver decrypts the data using his own private key. The key pair consists of these two keys. 

Q11. A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access? 

A. SCP 

B. SSH 

C. SFTP 

D. HTTPS 

Answer:

Explanation: 

Secure Shell (SSH) is a tunneling protocol originally used on Unix systems. It’s now available for both Unix and Windows environments. SSH is primarily intended for interactive terminal sessions. SSH is used to establish a command-line, text-only interface connection with a server, router, switch, or similar device over any distance. 

Q12. A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed? 

A. Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP 

B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS 

C. Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS 

D. Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS 

Answer:

Explanation: 

The question states that traffic on port 21, 69, 80, and 137-139 is blocked, while ports 22 and 443 are allowed. 

Port 21 is used for FTP by default. 

Port 69 is used for TFTP. 

Port 80 is used for HTTP. 

Ports 137-139 are used for NetBIOS. 

VMM uses SFTP over default port 22. 

Port 22 is used for SSH by default. 

SCP runs over TCP port 22 by default. 

Port 443 is used for HTTPS. 

Q13. Which of the following assessment techniques would a security administrator implement to ensure that systems and software are developed properly? 

A. Baseline reporting 

B. Input validation 

C. Determine attack surface 

D. Design reviews 

Answer:

Explanation: 

When implementing systems and software, an important step is the design of the systems and 

software. The systems and software should be designed to ensure that the system works as 

intended and is secure. 

The design review assessment examines the ports and protocols used, the rules, segmentation, 

and access control in the system or application. A design review is basically a check to ensure that 

the design of the system meets the security requirements. 

Q14. Which of the following has a storage root key? 

A. HSM 

B. EFS 

C. TPM 

D. TKIP 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates on non-volatile (NV) memory. Data stored on NV memory is retained unaltered when the device has no power. The storage root key is embedded in the TPM to protect TPM keys created by applications, so that these keys cannot be used without the TPM. 

Q15. Which of the following would BEST be used to calculate the expected loss of an event, if the likelihood of an event occurring is known? (Select TWO). 

A. DAC 

B. ALE 

C. SLE 

D. ARO 

E. ROI 

Answer: B,C 

Explanation: 

ALE (Annual Loss Expectancy) is equal to the SLE (Single Loss Expectancy) times the annualized rate of occurrence. SLE (Single Loss Expectancy) is equal to asset value (AV) times exposure factor (EF).