SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(1095 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA SY0-401 Free Practice Questions

Q1. The system administrator is tasked with changing the administrator password across all 2000 computers in the organization. Which of the following should the system administrator implement to accomplish this task? 

A. A security group 

B. A group policy 

C. Key escrow 

D. Certificate revocation 

Answer:

Explanation: 

Group policy is used to manage Windows systems in a Windows network domain environment by means of a Group Policy Object (GPO). GPO’s include a number of settings related to credentials, such as password complexity requirements, password history, password length, account lockout settings. 

Q2. A system administrator is notified by a staff member that their laptop has been lost. The laptop contains the user’s digital certificate. Which of the following will help resolve the issue? (Select TWO). 

A. Revoke the digital certificate 

B. Mark the key as private and import it 

C. Restore the certificate using a CRL 

D. Issue a new digital certificate 

E. Restore the certificate using a recovery agent 

Answer: A,D 

Explanation: 

The user's certificate must be revoked to ensure that the stolen computer cannot access 

resources the user has had access to. 

To grant the user access to the resources he must be issued a new certificate. 

Q3. A database administrator would like to start encrypting database exports stored on the SAN, but the storage administrator warns that this may drastically increase the amount of disk space used by the exports. Which of the following explains the reason for the increase in disk space usage? 

A. Deduplication is not compatible with encryption 

B. The exports are being stored on smaller SAS drives 

C. Encrypted files are much larger than unencrypted files 

D. The SAN already uses encryption at rest 

Answer:

Explanation: 

Encryption adds overhead to the data which results in and increase in file size. This overhead is attached to each file and could include the encryption/decryption key, data recovery files and data decryption field in file header. As a result, requires increased storage space. 

Q4. Which of the following is an important implementation consideration when deploying a wireless network that uses a shared password? 

A. Authentication server 

B. Server certificate 

C. Key length 

D. EAP method 

Answer:

Explanation: 

Key length is the main issue of concern since the wireless network uses a shared password. With risks of shared passwords makes the length of the password a crucial factor to risk mitigation. 

Q5. Methods to test the responses of software and web applications to unusual or unexpected inputs are known as: 

A. Brute force. 

B. HTML encoding. 

C. Web crawling. 

D. Fuzzing. 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 

Q6. Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her office without supplying a username/password combination. Upon disconnecting from the wireless network, she attempted to connect her personal tablet computer to the same wireless network and could not connect. 

Which of the following is MOST likely the reason? 

A. The company wireless is using a MAC filter. 

B. The company wireless has SSID broadcast disabled. 

C. The company wireless is using WEP. 

D. The company wireless is using WPA2. 

Answer:

Explanation: 

MAC filtering allows you to include or exclude computers and devices based on their MAC address. 

Q7. Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools? 

A. Identify user habits 

B. Disconnect system from network 

C. Capture system image 

D. Interview witnesses 

Answer:

Explanation: 

Capturing an image of the operating system in its exploited state can be helpful in revisiting the issue after the fact to learn more about it. Very much as helpful in same way that a virus sample is kept in laboratories to study later after a breakout. Also you should act in the order of volatility which states that the system image capture is first on the list of a forensic analysis. 

Q8. The common method of breaking larger network address space into smaller networks is known as: 

A. subnetting. 

B. phishing. 

C. virtualization. 

D. packet filtering. 

Answer:

Explanation: 

Q9. Matt, an administrator, is concerned about the wireless network being discovered by war driving. 

Which of the following can be done to mitigate this? 

A. Enforce a policy for all users to authentic through a biometric device. 

B. Disable all SSID broadcasting. 

C. Ensure all access points are running the latest firmware. 

D. Move all access points into public access areas. 

Answer:

Explanation: 

B: War driving is the act of using a detection tool to look for wireless networking signals. The setting making a wireless network closed (or at least hidden) is the disabling of service set identifier (SSID) broadcasting. Thus by disabling all SSID broadcasting you can mitigate the risk of war driving. 

Q10. A security administrator has concerns regarding employees saving data on company provided mobile devices. Which of the following would BEST address the administrator’s concerns? 

A. Install a mobile application that tracks read and write functions on the device. 

B. Create a company policy prohibiting the use of mobile devices for personal use. 

C. Enable GPS functionality to track the location of the mobile devices. 

D. Configure the devices so that removable media use is disabled. 

Answer:

Explanation: 

Mobile devices can be plugged into computers where they appear as an additional disk in the same way as a USB drive. This is known as removable media. This would enable users to copy company data onto the mobile devices. By disabling removable media use, the users will not be able to copy data onto the mobile devices. 

Q11. Company A submitted a bid on a contract to do work for Company B via email. Company B was insistent that the bid did not come from Company A. Which of the following would have assured that the bid was submitted by Company A? 

A. Steganography 

B. Hashing 

C. Encryption 

D. Digital Signatures 

Answer:

Explanation: 

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. The message is encrypted using the encryption system, and a second piece of information, the digital signature, is added to the message. 

Q12. Which of the following is where an unauthorized device is found allowing access to a network? 

A. Bluesnarfing 

B. Rogue access point 

C. Honeypot 

D. IV attack 

Answer:

Explanation: 

A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security threat to large organizations with many employees, because anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network to unauthorized parties. Rogue access points of the second kind target networks that do not employ mutual authentication (client-server server-client) and may be used in conjunction with a rogue RADIUS server, depending on security configuration of the target network. To prevent the installation of rogue access points, organizations can install wireless intrusion prevention systems to monitor the radio spectrum for unauthorized access points. 

Q13. Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee’s credential? 

A. Account expiration 

B. Password complexity 

C. Account lockout 

D. Dual factor authentication 

Answer:

Explanation: 

Account expiration is a secure feature to employ on user accounts for temporary workers, interns, or consultants. It automatically disables a user account or causes the account to expire at a specific time and on a specific day. 

Q14. An administrator has advised against the use of Bluetooth phones due to bluesnarfing concerns. 

Which of the following is an example of this threat? 

A. An attacker using the phone remotely for spoofing other phone numbers 

B. Unauthorized intrusions into the phone to access data 

C. The Bluetooth enabled phone causing signal interference with the network 

D. An attacker using exploits that allow the phone to be disabled 

Answer:

Explanation: 

Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such as the user's calendar, contact list and e-mail and text messages --without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled. 

Q15. A security engineer is given new application extensions each month that need to be secured prior to implementation. They do not want the new extensions to invalidate or interfere with existing application security. Additionally, the engineer wants to ensure that the new requirements are approved by the appropriate personnel. Which of the following should be in place to meet these two goals? (Select TWO). 

A. Patch Audit Policy 

B. Change Control Policy 

C. Incident Management Policy 

D. Regression Testing Policy 

E. Escalation Policy 

F. Application Audit Policy 

Answer: B,D 

Explanation: 

A backout (regression testing) is a reversion from a change that had negative consequences. It could be, for example, that everything was working fi ne until you installed a service pack on a production machine, and then services that were normally available were no longer accessible. The backout, in this instance, would revert the system to the state that it was in before the service pack was applied. Backout plans can include uninstalling service packs, hotfi xes, and patches, but they can also include reversing a migration and using previous firmware. A key component to creating such a plan is identifying what events will trigger your implementing the backout. A change control policy refers to the structured approach that is followed to secure a company’s assets in the event of changes occurring.