It is impossible to pass CompTIA SY0-401 exam without any help in the short term. Come to Ucertify soon and find the most advanced, correct and guaranteed CompTIA SY0-401 practice questions. You will get a surprising result by our Far out CompTIA Security+ Certification practice guides.

2021 Mar SY0-401 free practice test

Q541. Which of the following was based on a previous X.500 specification and allows either unencrypted authentication or encrypted authentication through the use of TLS? 

A. Kerberos 

B. TACACS+ 

C. RADIUS 

D. LDAP 

Answer:

Explanation: 

The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard 

application protocol for accessing and maintaining distributed directory information services over 

an Internet Protocol (IP) network. Directory services play an important role in developing intranet 

and Internet applications by allowing the sharing of information about users, systems, networks, 

services, and applications throughout the network. As examples, directory services may provide 

any organized set of records, often with a hierarchical structure, such as a corporate email 

directory. Similarly, a telephone directory is a list of subscribers with an address and a phone 

number. 

A common usage of LDAP is to provide a "single sign on" where one password for a user is 

shared between many services, such as applying a company login code to web pages (so that 

staff log in only once to company computers, and then are automatically logged into the company 

intranet). 

LDAP is based on a simpler subset of the standards contained within the X.500 standard. 

Because of this relationship, LDAP is sometimes called X.500-lite. 

A client starts an LDAP session by connecting to an LDAP server, called a Directory System 

Agent (DSA), by default on TCP and UDP port 389, or on port 636 for LDAPS. Global Catalog is 

available by default on ports 3268, and 3269 for LDAPS. The client then sends an operation 

request to the server, and the server sends responses in return. 

The client may request the following operations: 

StartTLS — use the LDAPv3 Transport Layer Security (TLS) extension for a secure connection 


Q542. Ann, a software developer, has installed some code to reactivate her account one week after her account has been disabled. Which of the following is this an example of? (Select TWO). 

A. Rootkit 

B. Logic Bomb 

C. Botnet 

D. Backdoor 

E. Spyware 

Answer: B,D 

Explanation: 

This is an example of both a logic bomb and a backdoor. The logic bomb is configured to ‘go off’ or activate one week after her account has been disabled. The reactivated account will provide a backdoor into the system. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files should they ever be terminated from the company. Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as Friday the 13th or April Fool's Day. Trojans that activate on certain dates are often called "time bombs". To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that disables certain functionality after a set 

time are not normally regarded as logic bombs. 

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal 

authentication, securing unauthorized remote access to a computer, obtaining access to plaintext, 

and so on, while attempting to remain undetected. The backdoor may take the form of an installed 

program (e.g., Back Orifice) or may subvert the system through a rootkit. 

A backdoor in a login system might take the form of a hard coded user and password combination 

which gives access to the system. 


Q543. Which of the following is an effective way to ensure the BEST temperature for all equipment within a datacenter? 

A. Fire suppression 

B. Raised floor implementation 

C. EMI shielding 

D. Hot or cool aisle containment 

Answer:

Explanation: 

There are often multiple rows of servers located in racks in server rooms. The rows of servers are known as aisles, and they can be cooled as hot aisles and cold aisles. With a hot aisle, hot air outlets are used to cool the equipment, whereas with cold aisles, cold air intake is used to cool the equipment. Combining the two, you have cold air intake from below the aisle and hot air outtake above it, providing constant circulation. This is a more effective way of controlling temperature to safeguard your equipment in a data center. 


Q544. When a communications plan is developed for disaster recovery and business continuity plans, the MOST relevant items to include would be: (Select TWO). 

A. Methods and templates to respond to press requests, institutional and regulatory reporting requirements. 

B. Methods to exchange essential information to and from all response team members, employees, suppliers, and customers. 

C. Developed recovery strategies, test plans, post-test evaluation and update processes. 

D. Defined scenarios by type and scope of impact and dependencies, with quantification of loss potential. 

E. Methods to review and report on system logs, incident response, and incident handling. 

Answer: A,B 

Explanation: 

A: External emergency communications that should fit into your business continuity plan include notifying family members of an injury or death, discussing the disaster with the media, and providing status information to key clients and stakeholders. Each message needs to be prepared with the audience (e.g., employees, media, families, government regulators) in mind; broad general announcements may be acceptable in the initial aftermath of an incident, but these will need to be tailored to the audiences in subsequent releases. 

B: A typical emergency communications plan should be extensive in detail and properly planned by a business continuity planner. Internal alerts are sent using either email, overhead building paging systems, voice messages or text messages to cell/smartphones with instructions to evacuate the building and relocate at assembly points, updates on the status of the situation, and notification of when it's safe to return to work. 


Q545. Which of the following security awareness training is BEST suited for data owners who are concerned with protecting the confidentiality of their data? 

A. Social networking use training 

B. Personally owned device policy training 

C. Tailgating awareness policy training 

D. Information classification training 

Answer:

Explanation: 

Information classification is done by confidentiality and comprises of three categories, namely: public use, internal use and restricted use. Knowing these categories and how to handle data according to its category is essential in protecting the confidentiality of the data. 


Most up-to-date SY0-401 torrent:

Q546. The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future? 

A. Job rotation 

B. Separation of duties 

C. Mandatory Vacations 

D. Least Privilege 

Answer:

Explanation: 

Separation of duties means that users are granted only the permissions they need to do their work and no more. More so it means that you are employing best practices. The segregation of duties and separation of environments is a way to reduce the likelihood of misuse of systems or information. A separation of duties policy is designed to reduce the risk of fraud and to prevent other losses in an organization. 


Q547. Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer information in a recycle bin without shredding it first. This is MOST likely to increase the risk of loss from which of the following attacks? 

A. Shoulder surfing 

B. Dumpster diving 

C. Tailgating 

D. Spoofing 

Answer:

Explanation: 

Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes. Seemingly innocent information like a phone list, calendar, or organizational chart can be used to assist an attacker using social engineering techniques to gain access to the network. To prevent dumpster divers from learning anything valuable from your trash, experts recommend that your company establish a disposal policy where all paper, including print-outs, is shredded in a cross-cut shredder before being recycled, all storage media is erased, and all staff is educated about the danger of untracked trash. 


Q548. An administrator implements SELinux on a production web server. After implementing this, the web server no longer serves up files from users' home directories. To rectify this, the administrator creates a new policy as the root user. This is an example of which of the following? (Select TWO). 

A. Enforcing SELinux in the OS kernel is role-based access control 

B. Enforcing SELinux in the OS kernel is rule-based access control 

C. The policy added by the root user is mandatory access control 

D. Enforcing SELinux in the OS kernel is mandatory access control 

E. The policy added by the root user is role-based access control 

F. The policy added by the root user is rule-based access control 

Answer: D,F 

Explanation: 


Q549. Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Ann ensure is open? 

A. 22 

B. 139 

C. 443 

D. 3389 

Answer:

Explanation: 

Remote Desktop Protocol (RDP) uses TCP port 3389. 


Q550. After a network outage, a PC technician is unable to ping various network devices. The network administrator verifies that those devices are working properly and can be accessed securely. 

Which of the following is the MOST likely reason the PC technician is unable to ping those devices? 

A. ICMP is being blocked 

B. SSH is not enabled 

C. DNS settings are wrong 

D. SNMP is not configured properly 

Answer:

Explanation: 

ICMP is a protocol that is commonly used by tools such as ping, traceroute, and pathping. ICMP offers no information If ICMP request queries go unanswered, or ICMP replies are lost or blocked.