SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(11190 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA SY0-401 Free Practice Questions

Q1. Which of the following is an XML based open standard used in the exchange of authentication and authorization information between different parties? 

A. LDAP 

B. SAML 

C. TACACS+ 

D. Kerberos 

Answer:

Explanation: 

Security Assertion Markup Language (SAML) is an open-standard data format centred on XML. It is used for supporting the exchange of authentication and authorization details between systems, services, and devices. 

Q2. After a network outage, a PC technician is unable to ping various network devices. The network administrator verifies that those devices are working properly and can be accessed securely. 

Which of the following is the MOST likely reason the PC technician is unable to ping those devices? 

A. ICMP is being blocked 

B. SSH is not enabled 

C. DNS settings are wrong 

D. SNMP is not configured properly 

Answer:

Explanation: 

ICMP is a protocol that is commonly used by tools such as ping, traceroute, and pathping. ICMP offers no information If ICMP request queries go unanswered, or ICMP replies are lost or blocked. 

Q3. After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the document is no longer encrypted. Which of the following can a security technician implement to ensure that documents stored on Joe’s desktop remain encrypted when moved to external media or other network based storage? 

A. Whole disk encryption 

B. Removable disk encryption 

C. Database record level encryption 

D. File level encryption 

Answer:

Explanation: 

Encryption is used to ensure the confidentiality of information. In this case you should make use of file level encryption. File level encryption is a form of disk encryption where individual files or directories are encrypted by the file system itself. This is in contrast to full disk encryption where the entire partition or disk, in which the file system resides, is encrypted. 

Q4. Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning? 

A. A recent security breach in which passwords were cracked. 

B. Implementation of configuration management processes. 

C. Enforcement of password complexity requirements. 

D. Implementation of account lockout procedures. 

Answer:

Explanation: 

A password only needs to be changed if it doesn’t meet the compliance requirements of the company’s password policy, or is evidently insecure. It will also need to be changed if it has been reused, or due to possible compromise as a result of a system intrusion. 

Q5. Which of the following is true about the recovery agent? 

A. It can decrypt messages of users who lost their private key. 

B. It can recover both the private and public key of federated users. 

C. It can recover and provide users with their lost or private key. 

D. It can recover and provide users with their lost public key. 

Answer:

Explanation: 

Explanation: A key recovery agent is an entity that has the ability to recover a private key, key components, or plaintext messages as needed. Using the recovered key the recovery agent can decrypt encrypted data. 

Q6. Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process? 

A. Separation of Duties 

B. Mandatory Vacations 

C. Discretionary Access Control 

D. Job Rotation 

Answer:

Explanation: 

Separation of duties means that users are granted only the permissions they need to do their work and no more. 

Q7. Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of: 

A. Redundant systems. 

B. Separation of duties. 

C. Layered security. 

D. Application control. 

Answer:

Explanation: 

Layered security is the practice of combining multiple mitigating security controls to protect resources and data. 

Q8. A company would like to take electronic orders from a partner; however, they are concerned that a non-authorized person may send an order. The legal department asks if there is a solution that provides non-repudiation. Which of the following would meet the requirements of this scenario? 

A. Encryption 

B. Digital signatures 

C. Steganography 

D. Hashing 

E. Perfect forward secrecy 

Answer:

Explanation: 

Q9. Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department’s server, and the accounting department should not have access to the HR department’s server. The network is separated by switches. Which of the following is designed to keep the HR department users from accessing the accounting department’s server and vice-versa? 

A. ACLs 

B. VLANs 

C. DMZs 

D. NATS 

Answer:

Explanation: 

A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function. 

Q10. Pete, the security administrator, has been notified by the IDS that the company website is under attack. Analysis of the web logs show the following string, indicating a user is trying to post a comment on the public bulletin board. 

INSERT INTO message `<script>source=http://evilsite</script> 

This is an example of which of the following? 

A. XSS attack 

B. XML injection attack 

C. Buffer overflow attack 

D. SQL injection attack 

Answer:

Explanation: 

The <script> </script> tags indicate that script is being inserted. Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users. Cross-site scripting uses known vulnerabilities in web-based applications, their servers, or plug-in systems on which they rely. Exploiting one of these, attackers fold malicious content into the content being delivered from the compromised site. When the resulting combined content arrives at the client-side web browser, it has all been delivered from the trusted source, and thus operates under the permissions granted to that system. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access-privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. 

Q11. Pete, a developer, writes an application. Jane, the security analyst, knows some things about the 

overall application but does not have all the details. Jane needs to review the software before it is released to production. Which of the following reviews should Jane conduct? 

A. Gray Box Testing 

B. Black Box Testing 

C. Business Impact Analysis 

D. White Box Testing 

Answer:

Explanation: 

Gray box testing, also called gray box analysis, is a strategy for software debugging in which the tester has limited knowledge of the internal details of the program. A gray box is a device, program or system whose workings are partially understood. Gray box testing can be contrasted with black box testing, a scenario in which the tester has no knowledge or access to the internal workings of a program, or white box testing, a scenario in which the internal particulars are fully known. Gray box testing is commonly used in penetration tests. Gray box testing is considered to be non-intrusive and unbiased because it does not require that the tester have access to the source code. With respect to internal processes, gray box testing treats a program as a black box that must be analyzed from the outside. During a gray box test, the person may know how the system components interact but not have detailed knowledge about internal program functions and operation. A clear distinction exists between the developer and the tester, thereby minimizing the risk of personnel conflicts. 

Q12. Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed? 

A. Bollards 

B. Video surveillance 

C. Proximity readers 

D. Fencing 

Answer:

Explanation: 

Video surveillance is making use of a camera, or CCTV that is able to record everything it sees and is always running. This way you will be able to check exactly who enters secure areas. 

Q13. A user has several random browser windows opening on their computer. Which of the following programs can be installed on his machine to help prevent this from happening? 

A. Antivirus 

B. Pop-up blocker 

C. Spyware blocker 

D. Anti-spam 

Answer:

Explanation: 

Pop-up blockers prevent websites from opening new browser windows without the users consent. These are often used for advertisements but can also be used to distribute malicious code. 

Q14. The Chief Information Officer (CIO) wants to implement a redundant server location to which the production server images can be moved within 48 hours and services can be quickly restored, in case of a catastrophic failure of the primary datacenter’s HVAC. Which of the following can be implemented? 

A. Cold site 

B. Load balancing 

C. Warm site 

D. Hot site 

Answer:

Explanation: 

Warm sites provide computer systems and compatible media capabilities. If a warm site is used, administrators and other staff will need to install and configure systems to resume operations. For most organizations, a warm site could be a remote office, a leased facility, or another organization with which yours has a reciprocal agreement. 

Q15. Which of the following security concepts identifies input variables which are then used to perform boundary testing? 

A. Application baseline 

B. Application hardening 

C. Secure coding 

D. Fuzzing 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks.