SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(33945 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA SY0-401 Free Practice Questions

Q1. Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash? 

A. Input validation 

B. Exception handling 

C. Application hardening 

D. Fuzzing 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 

Q2. A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server that is used by several employees. 

Which of the following is the BEST approach for implementation of the new application on the virtual server? 

A. Take a snapshot of the virtual server after installing the new application and store the snapshot in a secure location. 

B. Generate a baseline report detailing all installed applications on the virtualized server after installing the new application. 

C. Take a snapshot of the virtual server before installing the new application and store the snapshot in a secure location. 

D. Create an exact copy of the virtual server and store the copy on an external hard drive after installing the new application. 

Answer:

Explanation: 

Snapshots are backups of virtual machines that can be used to quickly recover from poor updates, and errors arising from newly installed applications. However, the snapshot should be taken before the application or update is installed. 

Q3. A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security controls? 

A. Integrity 

B. Availability 

C. Confidentiality 

D. Safety 

Answer:

Explanation: 

Fencing is used to increase physical security and safety. Locks are used to keep those who are unauthorized out. 

Q4. A security administrator notices that a specific network administrator is making unauthorized changes to the firewall every Saturday morning. Which of the following would be used to mitigate this issue so that only security administrators can make changes to the firewall? 

A. Mandatory vacations 

B. Job rotation 

C. Least privilege 

D. Time of day restrictions 

Answer:

Explanation: 

A least privilege policy is to give users only the permissions that they need to do their work and no more. That is only allowing security administrators to be able to make changes to the firewall by practicing the least privilege principle. 

Q5. While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing? 

A. EAP-TLS 

B. PEAP 

C. WEP 

D. WPA 

Answer:

Explanation: 

WEP is one of the more vulnerable security protocols. The only time to use WEP is when you must have compatibility with older devices that do not support new encryption. 

Q6. HOTSPOT 

For each of the given items, select the appropriate authentication category from the dropdown choices. 

Instructions: When you have completed the simu-lation, please select the Done button to submit. 

Answer:  

Q7. Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario? 

A. Application Firewall 

B. Anomaly Based IDS 

C. Proxy Firewall 

D. Signature IDS 

Answer:

Explanation: 

Anomaly-based detection watches the ongoing activity in the environment and looks for abnormal occurrences. An anomaly-based monitoring or detection method relies on definitions of all valid forms of activity. This database of known valid activity allows the tool to detect any and all anomalies. Anomaly-based detection is commonly used for protocols. Because all the valid and legal forms of a protocol are known and can be defined, any variations from those known valid constructions are seen as anomalies. 

Q8. A network administrator wants to block both DNS requests and zone transfers coming from outside IP addresses. The company uses a firewall which implements an implicit allow and is currently configured with the following ACL applied to its external interface. 

PERMIT TCP ANY ANY 80 

PERMIT TCP ANY ANY 443 

Which of the following rules would accomplish this task? (Select TWO). 

A. Change the firewall default settings so that it implements an implicit deny 

B. Apply the current ACL to all interfaces of the firewall 

C. Remove the current ACL 

D. Add the following ACL at the top of the current ACL DENY TCP ANY ANY 53 

E. Add the following ACL at the bottom of the current ACL DENY ICMP ANY ANY 53 

F. Add the following ACL at the bottom of the current ACL DENY IP ANY ANY 53 

Answer: A,F 

Explanation: 

Implicit deny is the default security stance that says if you aren’t specifically granted access or privileges for a resource, you’re denied access by default. Implicit deny is the default response when an explicit allow or deny isn’t present. 

DNS operates over TCP and UDP port 53. TCP port 53 is used for zone transfers. These are zone file exchanges between DNS servers, special manual queries, or used when a response exceeds 512 bytes. UDP port 53 is used for most typical DNS queries. 

Q9. Which of the following explains the difference between a public key and a private key? 

A. The public key is only used by the client while the private key is available to all. Both keys are mathematically related. 

B. The private key only decrypts the data while the public key only encrypts the data. Both keys are mathematically related. 

C. The private key is commonly used in symmetric key decryption while the public key is used in asymmetric key decryption. 

D. The private key is only used by the client and kept secret while the public key is available to all. 

Answer:

Explanation: 

The private key must be kept secret at all time. The private key is only by the client. The public key is available to anybody. 

Q10. Which of the following would a security administrator use to verify the integrity of a file? 

A. Time stamp 

B. MAC times 

C. File descriptor 

D. Hash 

Answer:

Explanation: 

Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash tables and it is a one-way transformation in order to validate the integrity of data. 

Q11. A system administrator is configuring UNIX accounts to authenticate against an external server. The configuration file asks for the following information DC=ServerName and DC=COM. Which of the following authentication services is being used? 

A. RADIUS 

B. SAML 

C. TACACS+ 

D. LDAP 

Answer:

Explanation: 

The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network. As examples, directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number. 

An entry can look like this when represented in LDAP Data Interchange Format (LDIF) (LDAP itself is a binary protocol): dn: cn=John Doe,dc=example,dc=com cn: John Doe givenName: John sn: Doe telephoneNumber: +1 888 555 6789 telephoneNumber: +1 888 555 1232 mail: john@example.com manager: cn=Barbara Doe,dc=example,dc=com objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: person objectClass: top "dn" is the distinguished name of the entry; it is neither an attribute nor a part of the entry. "cn=John Doe" is the entry's RDN (Relative Distinguished Name), and "dc=example,dc=com" is the DN of the parent entry, where "dc" denotes 'Domain Component'. The other lines show the attributes in the entry. Attribute names are typically mnemonic strings, like "cn" for common name, "dc" for domain component, "mail" for e-mail address, and "sn" for surname. 

Q12. Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network? 

A. Cross-platform compatibility issues between personal devices and server-based applications 

B. Lack of controls in place to ensure that the devices have the latest system patches and signature files 

C. Non-corporate devices are more difficult to locate when a user is terminated 

D. Non-purchased or leased equipment may cause failure during the audits of company-owned assets 

Answer:

Explanation: 

With employees who want to bring their own devices you will have to make them understand why they cannot. You do not want them plugging in a flash drive, let alone a camera, smartphone, tablet computer, or other device, on which company fi les could get intermingled with personal files. Allowing this to happen can create situations where data can leave the building that shouldn’t as well as introduce malware to the system. Employees should not sync unauthorized smartphones to their work systems. Some smartphones use multiple wireless spectrums and unwittingly open up the possibility for an attacker in the parking lot to gain access through the phone to the internal network. Thus if you do not have controls in place then your network is definitely at risk. 

Q13. Which of the following would allow the organization to divide a Class C IP address range into several ranges? 

A. DMZ 

B. Virtual LANs 

C. NAT 

D. Subnetting 

Answer:

Explanation: 

Subnetting is a dividing process used on networks to divide larger groups of hosts into smaller collections. 

Q14. A company hires outside security experts to evaluate the security status of the corporate network. All of the company’s IT resources are outdated and prone to crashing. The company requests that all testing be performed in a way which minimizes the risk of system failures. Which of the following types of testing does the company want performed? 

A. Penetration testing 

B. WAF testing 

C. Vulnerability scanning 

D. White box testing 

Answer:

Explanation: 

Vulnerability scanning has minimal impact on network resource due to the passive nature of the scanning. 

A vulnerability scan is the process of scanning the network and/or I.T. infrastructure for threats and vulnerabilities. The threats and vulnerabilities are then evaluated in a risk assessment and the necessary actions taken to resolve and vulnerabilities. A vulnerability scan scans for known weaknesses such as missing patches or security updates. 

A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. 

Q15. The system administrator is reviewing the following logs from the company web server: 

12:34:56 GET /directory_listing.php?user=admin&pass=admin1 

12:34:57 GET /directory_listing.php?user=admin&pass=admin2 

12:34:58 GET /directory_listing.php?user=admin&pass=1admin 

12:34:59

 GET /directory_listing.php?user=admin&pass=2admin Which of the following is this an example of? 

A. Online rainbow table attack 

B. Offline brute force attack 

C. Offline dictionary attack 

D. Online hybrid attack 

Answer:

Explanation: