SY0-401 Premium Bundle

SY0-401 Premium Bundle

CompTIA Security+ Certification Certification Exam

4.5 
(12465 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA SY0-401 Free Practice Questions

Q1. Which device monitors network traffic in a passive manner? 

A. Sniffer 

B. IDS 

C. Firewall 

D. Web browser 

Answer:

Explanation: 

A sniffer is another name for a protocol analyzer. A protocol analyzer performs its function in a 

passive manner. In other words, computers on the network do not know that their data packets 

have been captured. 

A Protocol Analyzer is a hardware device or more commonly a software program used to capture 

network data communications sent between devices on a network. Capturing packets sent from a 

computer system is known as packet sniffing. 

Well known software protocol analyzers include Message Analyzer (formerly Network Monitor) 

from Microsoft and Wireshark (formerly Ethereal). 

A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If computers are 

connected to a local area network that is not filtered or switched, the traffic can be broadcast to all 

computers contained in the same segment. This doesn’t generally occur, since computers are 

generally told to ignore all the comings and goings of traffic from other computers. However, in the 

case of a sniffer, all traffic is shared when the sniffer software commands the Network Interface 

Card (NIC) to stop ignoring the traffic. The NIC is put into promiscuous mode, and it reads 

communications between computers within a particular segment. This allows the sniffer to seize everything that is flowing in the network, which can lead to the unauthorized access of sensitive data. A packet sniffer can take the form of either a hardware or software solution. A sniffer is also known as a packet analyzer. 

Q2. A security administrator wants to check user password complexity. Which of the following is the 

BEST tool to use? 

A. Password history 

B. Password logging 

C. Password cracker 

D. Password hashing 

Answer:

Explanation: 

The most important countermeasure against password crackers is to use long, complex passwords, which are changed regularly. Password-cracking tools compare hashes from potential passwords with the hashes stored in the accounts database. Each potential password is hashed, and that hash value is compared with the accounts database. If a match is found, the password-cracker tool has discovered a password for a user account. 

Q3. Which of the following is a programming interface that allows a remote computer to run programs on a local machine? 

A. RPC 

B. RSH 

C. SSH 

D. SSL 

Answer:

Explanation: 

Remote Procedure Call (RPC) is a programming interface that allows a remote computer to run programs on a local machine. 

Q4. End-user awareness training for handling sensitive personally identifiable information would include secure storage and transmission of customer: 

A. Date of birth. 

B. First and last name. 

C. Phone number. 

D. Employer name. 

Answer:

Explanation: 

Personally identifiable information (PII) is a catchall for any data that can be used to uniquely identify an individual. This data can be anything from the person’s name to a fingerprint (think biometrics), credit card number, or patient record. Date of birth is personally identifiable information. 

Q5. A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected? 

A. Block cipher 

B. Stream cipher 

C. CRC 

D. Hashing algorithm 

Answer:

Explanation: 

With a block cipher the algorithm works on chunks of data—encrypting one and then moving to the 

next. 

Example: Blowfish is an encryption system that performs a 64-bit block cipher at very fast speeds. 

Q6. An administrator notices that former temporary employees’ accounts are still active on a domain. 

Which of the following can be implemented to increase security and prevent this from happening? 

A. Implement a password expiration policy. 

B. Implement an account expiration date for permanent employees. 

C. Implement time of day restrictions for all temporary employees. 

D. Run a last logon script to look for inactive accounts. 

Answer:

Explanation: 

You can run a script to return a list of all accounts that haven’t been used for a number of days, for example 30 days. If an account hasn’t been logged into for 30 days, it’s a safe bet that the user the account belonged to is no longer with the company. You can then disable all the accounts that the script returns. A disabled account cannot be used to log in to a system. This is a good security measure. As soon as an employee leaves the company, the employees account should always be disabled. 

Q7. Which of the following practices reduces the management burden of access management? 

A. Password complexity policies 

B. User account audit 

C. Log analysis and review 

D. Group based privileges 

Answer:

Explanation: Granting permissions to all members of a group is quicker than individually assigning them to each user. This means an administrator will spend less time on assigning permissions to users who require the same access privileges. 

Q8. A company requires that a user’s credentials include providing something they know and something they are in order to gain access to the network. Which of the following types of authentication is being described? 

A. Biometrics 

B. Kerberos 

C. Token 

D. Two-factor 

Answer:

Explanation: Two-factor authentication is when two different authentication factors are provided for authentication purposes. In this case, “something they know and something they are”. 

Q9. A security administrator must implement a wireless encryption system to secure mobile devices’ communication. Some users have mobile devices which only support 56-bit encryption. Which of the following wireless encryption methods should be implemented? 

A. RC4 

B. AES 

C. MD5 

D. TKIP 

Answer:

Explanation: 

RC4 is popular with wireless and WEP/WPA encryption. It is a streaming cipher that works with key sizes between 40 and 2048 bits, and it is used in SSL and TLS. 

Q10. Several departments in a corporation have a critical need for routinely moving data from one system to another using removable storage devices. Senior management is concerned with data loss and the introduction of malware on the network. Which of the following choices BEST mitigates the range of risks associated with the continued use of removable storage devices? 

A. Remote wiping enabled for all removable storage devices 

B. Full-disk encryption enabled for all removable storage devices 

C. A well defined acceptable use policy 

D. A policy which details controls on removable storage use 

Answer:

Explanation: 

Q11. Which of the following security concepts can prevent a user from logging on from home during the weekends? 

A. Time of day restrictions 

B. Multifactor authentication 

C. Implicit deny 

D. Common access card 

Answer:

Explanation: 

Time of day restrictions limit when users can access specific systems based on the time of day or week. It can limit access to sensitive environments to normal business hours when oversight and monitoring can be performed to prevent fraud, abuse, or intrusion. 

Q12. Vendors typically ship software applications with security settings disabled by default to ensure a wide range of interoperability with other applications and devices. A security administrator should perform which of the following before deploying new software? 

A. Application white listing 

B. Network penetration testing 

C. Application hardening 

D. Input fuzzing testing 

Answer:

Explanation: 

Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing unnecessary functions and features, removing unnecessary usernames or logins and disabling unnecessary services. 

Q13. Which of the following can be used by a security administrator to successfully recover a user’s forgotten password on a password protected file? 

A. Cognitive password 

B. Password sniffing 

C. Brute force 

D. Social engineering 

Answer:

Explanation: 

One way to recover a user’s forgotten password on a password protected file is to guess it. A brute force attack is an automated attempt to open the file by using many different passwords. 

A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. Brute force attacks may be used by criminals to crack encrypted data, or by security analysts to test an organization's network security. A brute force attack may also be referred to as brute force cracking. For example, a form of brute force attack known as a dictionary attack might try all the words in a dictionary. Other forms of brute force attack might try commonly-used passwords or combinations of letters and numbers. An attack of this nature can be time- and resource-consuming. Hence the name "brute force attack;" success is usually based on computing power and the number of combinations tried rather than an ingenious algorithm. 

Q14. The systems administrator notices that many employees are using passwords that can be easily guessed or are susceptible to brute force attacks. Which of the following would BEST mitigate this risk? 

A. Enforce password rules requiring complexity. 

B. Shorten the maximum life of account passwords. 

C. Increase the minimum password length. 

D. Enforce account lockout policies. 

Answer:

Explanation: 

Password complexity often requires the use of a minimum of three out of four standard character types for a password. The more characters in a password that includes some character complexity, the more resistant it is to brute force attacks. 

Q15. Which of the following malware types is MOST likely to execute its payload after Jane, an employee, has left the company? 

A. Rootkit 

B. Logic bomb 

C. Worm 

D. Botnet 

Answer:

Explanation: 

This is an example of a logic bomb. The logic bomb is configured to ‘go off’ or when Jane has left the company. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files should they ever be terminated from the company. Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as Friday the 13th or April Fool's Day. Trojans that activate on certain dates are often called "time bombs". To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that disables certain functionality after a set time are not normally regarded as logic bombs.