It is more faster and easier to pass the CompTIA sy0 401 practice test exam by using Vivid CompTIA CompTIA Security+ Certification questuins and answers. Immediate access to the Regenerate sy0 401 pdf Exam and find the same core area sy0 401 dump questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q361. Layer 7 devices used to prevent specific types of html tags are called: 

A. Firewalls 

B. Content filters 

C. Routers 

D. NIDS 

Answer:

Explanation: 

A content filter is a is a type of software designed to restrict or control the content a reader is authorised to access, particularly when used to limit material delivered over the Internet via the Web, e-mail, or other means. Because the user and the OSI layer interact directly with the content filter, it operates at Layer 7 of the OSI model. 


Q362. A security analyst is reviewing firewall logs while investigating a compromised web server. The following ports appear in the log: 

22, 25, 445, 1433, 3128, 3389, 6667 

Which of the following protocols was used to access the server remotely? 

A. LDAP 

B. HTTP 

C. RDP 

D. HTTPS 

Answer:

Explanation: 

RDP uses TCP port 3389. 


Q363. Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a competitor. Joe had already been working for two hours before leaving the premises. 

A security technician was asked to prepare a report of files that had changed since last night’s integrity scan. 

Which of the following could the technician use to prepare the report? (Select TWO). 

A. PGP 

B. MD5 

C. ECC 

D. AES 

E. Blowfish 

F. HMAC 

Answer: B,F 

Explanation: 

B: MD5 can be used to locate the data which has changed. 

The Message Digest Algorithm (MD) creates a hash value and uses a one-way hash. The hash 

value is used to help maintain integrity. There are several versions of MD; the most common are 

MD5, MD4, and MD2. 

F: A common method of verifying integrity involves adding a message authentication code (MAC) 

to the message. 

HMAC (Hash-Based Message Authentication Code) uses a hashing algorithm along with a 

symmetric key. 


Q364. Jane, a VPN administrator, was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Jane select for the tunnel encryption? 

A. Blowfish 

B. DES 

C. SHA256 

D. HMAC 

Answer:

Explanation: 

Blowfish is an encryption system that performs a 64-bit block cipher at very fast speeds. It is a symmetric block cipher that can use variable-length keys (from 32 bits to 448 bits). Among the alternatives listed above, it is the only cipher that can use a 128-bit key and which does provide additional security through a symmetric key. 


Q365. A company is looking to improve their security posture by addressing risks uncovered by a recent penetration test. Which of the following risks is MOST likely to affect the business on a day-to-day basis? 

A. Insufficient encryption methods 

B. Large scale natural disasters 

C. Corporate espionage 

D. Lack of antivirus software 

Answer:

Explanation: 

The most common threat to computers is computer viruses. A computer can become infected with a virus through day-to-day activities such as browsing web sites or emails. As browsing and opening emails are the most common activities performed by all users, computer viruses represent the most likely risk to a business. 


Q366. An administrator needs to connect a router in one building to a router in another using Ethernet. Each router is connected to a managed switch and the switches are connected to each other via a fiber line. Which of the following should be configured to prevent unauthorized devices from connecting to the network? 

A. Configure each port on the switches to use the same VLAN other than the default one 

B. Enable VTP on both switches and set to the same domain 

C. Configure only one of the routers to run DHCP services 

D. Implement port security on the switches 

Answer:

Explanation: 

Port security in IT can mean several things: The physical control of all connection points, such as RJ-45 wall jacks or device ports, so that no unauthorized users or unauthorized devices can attempt to connect into an open port. The management of TCP and User Datagram Protocol (UDP) ports. If a service is active and assigned to a port, then that port is open. All the other 65,535 ports (of TCP or UDP) are closed if a service isn’t actively using them. Port knocking is a security system in which all ports on a system appear closed. However, if the client sends packets to a specific set of ports in a certain order, a bit like a secret knock, then the desired service port becomes open and allows the client software to connect to the service. 


Q367. A security administrator must implement a system that will support and enforce the following file system access control model: FILE NAME SECURITY LABEL Employees.doc Confidential Salary.xls Confidential 

OfficePhones.xls Unclassified 

PersonalPhones.xls Restricted 

Which of the following should the security administrator implement? 

A. White and black listing 

B. SCADA system 

C. Trusted OS 

D. Version control 

Answer:

Explanation: 


Q368. To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation? 

A. Management 

B. Administrative 

C. Technical 

D. Operational 

Answer:

Explanation: 

controls such as preventing unauthorized access to PC’s and applying screensavers that lock the PC after five minutes of inactivity is a technical control type, the same as Identification and Authentication, Access Control, Audit and Accountability as well as System and Communication Protection. 


Q369. Which of the following are restricted to 64-bit block sizes? (Select TWO). 

A. PGP 

B. DES 

C. AES256 

D. RSA 

E. 3DES 

F. AES 

Answer: B,E 

Explanation: 

B: The Data Encryption Standard (DES) has been used since the mid-1970s. It was the primary standard used in government and industry until it was replaced by AES. It’s based on a 56-bit key and has several modes that offer security and integrity. It is now considered insecure because of the small key size. 

E: Triple-DES (3DES) is a technological upgrade of DES. 3DES is still used, even though AES is the preferred choice for government applications. 3DES is considerably harder to break than many other systems, and it’s more secure than DES. It increases the key length to 168 bits (using three 56-bit DES keys). 


Q370. Which of the following is used by the recipient of a digitally signed email to verify the identity of the sender? 

A. Recipient’s private key 

B. Sender’s public key 

C. Recipient’s public key 

D. Sender’s private key 

Answer:

Explanation: 

When the sender wants to send a message to the receiver. It’s important that this message not be altered. The sender uses the private key to create a digital signature. The message is, in effect, signed with the private key. The sender then sends the message to the receiver. The recipient uses the public key attached to the message to validate the digital signature. If the values match, the receiver knows the message is authentic. Thus the recipient uses the sender’s public key to verify the sender’s identity.