SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(38340 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA SY0-401 Free Practice Questions

Q1. Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server? 

A. SSLv2 

B. SSHv1 

C. RSA 

D. TLS 

Answer:

Explanation: 

HTTP Secure HTTP Secure (HTTPS) is the protocol used for “secure” web pages that users should see when they must enter personal information such as credit card numbers, passwords, and other identifiers. It combines HTTP with SSL/TLS to provide encrypted communication. Transport Layer Security (TLS) is a security protocol that expands upon SSL. Many industry analysts predict that TLS will replace SSL, and it is also referred to as SSL 3.1. 

Q2. A company’s business model was changed to provide more web presence and now its ERM software is no longer able to support the security needs of the company. The current data center will continue to provide network and security services. Which of the following network elements would be used to support the new business model? 

A. Software as a Service 

B. DMZ 

C. Remote access support 

D. Infrastructure as a Service 

Answer:

Explanation: 

Software as a Service (SaaS) allows for on-demand online access to specific software applications or suites without having to install it locally. This will allow the data center to continue providing network and security services. 

Q3. A new virtual server was created for the marketing department. The server was installed on an existing host machine. Users in the marketing department report that they are unable to connect to the server. Technicians verify that the server has an IP address in the same VLAN as the marketing department users. Which of the following is the MOST likely reason the users are unable to connect to the server? 

A. The new virtual server’s MAC address was not added to the ACL on the switch 

B. The new virtual server’s MAC address triggered a port security violation on the switch 

C. The new virtual server’s MAC address triggered an implicit deny in the switch 

D. The new virtual server’s MAC address was not added to the firewall rules on the switch 

Answer:

Explanation: 

Configuring the switch to allow only traffic from computers based upon their physical address is known as MAC filtering. The physical address is known as the MAC address. Every network adapter has a unique MAC address hardcoded into the adapter. You can configure the ports of a switch to allow connections from computers with specific MAC addresses only and block all other MAC addresses. In computer networking, MAC Filtering (or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network. 

Q4. Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Ann ensure is open? 

A. 22 

B. 139 

C. 443 

D. 3389 

Answer:

Explanation: 

Remote Desktop Protocol (RDP) uses TCP port 3389. 

Q5. A security technician is attempting to access a wireless network protected with WEP. The technician does not know any information about the network. Which of the following should the technician do to gather information about the configuration of the wireless network? 

A. Spoof the MAC address of an observed wireless network client 

B. Ping the access point to discover the SSID of the network 

C. Perform a dictionary attack on the access point to enumerate the WEP key 

D. Capture client to access point disassociation packets to replay on the local PC’s loopback 

Answer:

Explanation: 

With ARP spoofing (also known as ARP poisoning), the MAC (Media Access Control) address of the data is faked. By faking this value, it is possible to make it look as if the data came from a network that it did not. This can be used to gain access to the network, to fool the router into sending data here that was intended for another host, or to launch a DoS attack. In all cases, the address being faked is an address of a legitimate user, and that makes it possible to get around such measures as allow/deny lists. Note: As an example, the initialization vector (IV) that WEP uses for encryption is 24-bit, which is quite weak and means that IVs are reused with the same key. By examining the repeating result, it was easy for attackers to crack the WEP secret key. This is known as an IV attack. 

Q6. Which of the following is true about the recovery agent? 

A. It can decrypt messages of users who lost their private key. 

B. It can recover both the private and public key of federated users. 

C. It can recover and provide users with their lost or private key. 

D. It can recover and provide users with their lost public key. 

Answer:

Explanation: 

Explanation: A key recovery agent is an entity that has the ability to recover a private key, key components, or plaintext messages as needed. Using the recovered key the recovery agent can decrypt encrypted data. 

Q7. The systems administrator wishes to implement a hardware-based encryption method that could also be used to sign code. They can achieve this by: 

A. Utilizing the already present TPM. 

B. Configuring secure application sandboxes. 

C. Enforcing whole disk encryption. 

D. Moving data and applications into the cloud. 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 

Q8. An attacker attempted to compromise a web form by inserting the following input into the username field: admin)(|(password=*)) 

Which of the following types of attacks was attempted? 

A. SQL injection 

B. Cross-site scripting 

C. Command injection 

D. LDAP injection 

Answer:

Explanation: 

LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it’s possible to modify LDAP statements using a local proxy. This could result in the execution of arbitrary commands such as granting permissions to unauthorized queries, and content modification inside the LDAP tree. The same advanced exploitation techniques available in SQL Injection can be similarly applied in LDAP Injection. In a page with a user search form, the following code is responsible to catch input value and generate a LDAP query that will be used in LDAP database. <input type="text" size=20 name="userName">Insert the username</input> The LDAP query is narrowed down for performance and the underlying code for this function might be the following: String ldapSearchQuery = "(cn=" + $userName + ")"; System.out.println(ldapSearchQuery); 

If the variable $userName is not validated, it could be possible accomplish LDAP injection, as follows: If a user puts “*” on box search, the system may return all the usernames on the LDAP base If a user puts “jonys) (| (password = * ) )”, it will generate the code bellow revealing jonys’ password ( cn = jonys ) ( | (password = * ) ) 

Q9. The system administrator has been notified that many users are having difficulty connecting to the company’s wireless network. They take a new laptop and physically go to the access point and connect with no problems. Which of the following would be the MOST likely cause? 

A. The certificate used to authenticate users has been compromised and revoked. 

B. Multiple war drivers in the parking lot have exhausted all available IPs from the pool to deny access. 

C. An attacker has gained access to the access point and has changed the encryption keys. 

D. An unauthorized access point has been configured to operate on the same channel. 

Answer:

Explanation: 

Wireless Access Points can be configured to use a channel. If you have multiple access points within range of each other, you should configure the access points to use different channels. Different channels use different frequencies. If you have two access points using the same channel, their wifi signals will interfere with each other. The question states that that many users are having difficulty connecting to the company’s wireless network. This is probably due to the signal being weakened by interference from another access point using the same channel. When the administrator takes a new laptop and physically goes to the access point and connects with no problems, he is able to connect because he is near the access point and therefore has a strong signal. 

Q10. A company has just deployed a centralized event log storage system. Which of the following can be used to ensure the integrity of the logs after they are collected? 

A. Write-once drives 

B. Database encryption 

C. Continuous monitoring 

D. Role-based access controls 

Answer:

Explanation: 

Q11. DRAG DROP 

A security administrator is given the security and availability profiles for servers that are being deployed. 

1) Match each RAID type with the correct configuration and MINIMUM number of drives. 

2) Review the server profiles and match them with the appropriate RAID type based on integrity, availability, I/O, storage requirements. Instructions: 

. All drive definitions can be dragged as many times as necessary 

. Not all placeholders may be filled in the RAID configuration boxes 

. If parity is required, please select the appropriate number of parity checkboxes 

. Server profiles may be dragged only once 

If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue. 

Answer:  

Q12. A computer is suspected of being compromised by malware. The security analyst examines the computer and finds that a service called Telnet is running and connecting to an external website over port 443. This Telnet service was found by comparing the system’s services to the list of standard services on the company’s system image. This review process depends on: 

A. MAC filtering. 

B. System hardening. 

C. Rogue machine detection. 

D. Baselining. 

Answer:

Explanation: 

Application baseline defines the level or standard of security that will be implemented and maintained for the application. It may include requirements of hardware components, operating system versions, patch levels, installed applications and their configurations, and available ports and services. Systems can be compared to the baseline to ensure that the required level of security is being maintained. 

Q13. A hacker has discovered a simple way to disrupt business for the day in a small company which relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely working staff access to company systems with a script. Which of the following security controls is the hacker exploiting? 

A. DoS 

B. Account lockout 

C. Password recovery 

D. Password complexity 

Answer:

Explanation: 

B: Account lockout automatically disables an account due to repeated failed log on attempts. The hacker must have executed a script to repeatedly try logging on to the remote accounts, forcing the account lockout policy to activate. 

Q14. A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need access to sales. Which of the following should be implemented to give the appropriate access while enforcing least privilege? 

A. Assign individual permissions to users 1 and 2 for payroll. Assign individual permissions to users 4 and 5 for sales. Make user 3 an administrator. 

B. Make all users administrators and then restrict users 1 and 2 from sales. Then restrict users 4 and 5 from payroll. 

C. Create two additional generic accounts, one for payroll and one for sales that users utilize. 

D. Create a sales group with users 3, 4 and 5. Create a payroll group with users 1, 2 and 3. 

Answer:

Explanation: 

Q15. Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic? 

A. Sniffer 

B. Router 

C. Firewall 

D. Switch 

Answer:

Explanation: 

Ip tables are a user-space application program that allows a system administrator to configure the tables provided by the Linux kernel firewall and the chains and rules it stores.