Validated of SY0-401 test preparation materials and testing material for CompTIA certification for examinee, Real Success Guaranteed with Updated SY0-401 pdf dumps vce Materials. 100% PASS CompTIA Security+ Certification exam Today!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

2021 Apr SY0-401 simulations

Q51. An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests. Which of the following describes how this private key should be stored so that it is protected from theft? 

A. Implement full disk encryption 

B. Store on encrypted removable media 

C. Utilize a hardware security module 

D. Store on web proxy file system 

Answer:

Explanation: 

Hardware Security Module (HSM) hardware-based encryption solution that is usually used in conjunction with PKI to enhance security with certification authorities (CAs). It is available as an expansion card and can cryptographic keys, passwords, or certificates. 


Q52. A company has just deployed a centralized event log storage system. Which of the following can be used to ensure the integrity of the logs after they are collected? 

A. Write-once drives 

B. Database encryption 

C. Continuous monitoring 

D. Role-based access controls 

Answer:

Explanation: 


Q53. Which of the following authentication services requires the use of a ticket-granting ticket (TGT) server in order to complete the authentication process? 

A. TACACS+ 

B. Secure LDAP 

C. RADIUS 

D. Kerberos 

Answer:

Explanation: 

The basic process of Kerberos authentication is as follows: 

The subject provides logon credentials. 

The Kerberos client system encrypts the password and transmits the protected credentials to the 

KDC. 

The KDC verifies the credentials and then creates a ticket-granting ticket (TGT—a hashed form of 

the subject’s password with the addition of a time stamp that indicates a valid lifetime). The TGT is 

encrypted and sent to the client. 

The client receives the TGT. At this point, the subject is an authenticated principle in the Kerberos 

realm. 

The subject requests access to resources on a network server. This causes the client to request a 

service ticket (ST) from the KDC. 

The KDC verifies that the client has a valid TGT and then issues an ST to the client. The ST 

includes a time stamp that indicates its valid lifetime. 

The client receives the ST. 

The client sends the ST to the network server that hosts the desired resource. 

The network server verifies the ST. If it’s verified, it initiates a communication session with the 

client. From this point forward, Kerberos is no longer involved. 


Q54. Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks? 

A. Check the referrer field in the HTTP header 

B. Disable Flash content 

C. Use only cookies for authentication 

D. Use only HTTPS URLs 

Answer:

Explanation: 

XSRF or cross-site request forgery applies to web applications and is an attack that exploits the web application’s trust of a user who known or is supposed to have been authenticated. This is accomplished by changing values in the HTTP header and even in the user’s cookie to falsify access. It can be prevented by embedding additional authentication data into requests that allows the web application to detect requests from unauthorized locations. Examples are synchronizer token patterns, cookie-to-header tokens, and checking the HTTP Referrer header and the HTTP Origin header. 


Q55. A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server’s drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO? (Select TWO). 

A. Disk hashing procedures 

B. Full disk encryption 

C. Data retention policies 

D. Disk wiping procedures 

E. Removable media encryption 

Answer: B,D 

Explanation: 

B: Full disk encryption is when the entire volume is encrypted; the data is not accessible to someone who might boot another operating system in an attempt to bypass the computer’s security. Full disk encryption is sometimes referred to as hard drive encryption. 

D: Disk wiping is the process of overwriting data on the repeatedly, or using a magnet to alter the magnetic structure of the disks. This renders the data unreadable. 


Up to the immediate present SY0-401 pdf exam:

Q56. A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal? 

A. Block port 23 on the L2 switch at each remote site 

B. Block port 23 on the network firewall 

C. Block port 25 on the L2 switch at each remote site 

D. Block port 25 on the network firewall 

Answer:

Explanation: 

Telnet is a terminal-emulation network application that supports remote connectivity for executing commands and running applications but doesn’t support transfer of fi les. Telnet uses TCP port 23. Because it’s a clear text protocol and service, it should be avoided and replaced with SSH. 


Q57. Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system? 

A. Input validation 

B. Network intrusion detection system 

C. Anomaly-based HIDS 

D. Peer review 

Answer:

Explanation: 

Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain. 


Q58. Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords? 

A. EAP-MD5 

B. WEP 

C. PEAP-MSCHAPv2 

D. EAP-TLS 

Answer:

Explanation: 

PEAP-MS-CHAP v2 is easier to deploy than EAP-TLS or PEAP-TLS because user authentication is accomplished via password-base credentials (user name and password) rather than digital certificates or smart cards. 


Q59. Which of the following is described as an attack against an application using a malicious file? 

A. Client side attack 

B. Spam 

C. Impersonation attack 

D. Phishing attack 

Answer:

Explanation: 

In this question, a malicious file is used to attack an application. If the application is running on a 

client computer, this would be a client side attack. Attacking a service or application on a server 

would be a server side attack. 

Client-side attacks target vulnerabilities in client applications interacting with a malicious data. The 

difference is the client is the one initiating the bad connection. 

Client-side attacks are becoming more popular. This is because server side attacks are not as 

easy as they once were according to apache.org. 

Attackers are finding success going after weaknesses in desktop applications such as browsers, 

media players, common office applications and e-mail clients. 

To defend against client-side attacks keep-up the most current application patch levels, keep 

antivirus software updated and keep authorized software to a minimum. 


Q60. A technician is investigating intermittent switch degradation. The issue only seems to occur when the building’s roof air conditioning system runs. Which of the following would reduce the connectivity issues? 

A. Adding a heat deflector 

B. Redundant HVAC systems 

C. Shielding 

D. Add a wireless network 

Answer:

Explanation: 

EMI can cause circuit overload, spikes, or even electrical component failure. In the question it is mentioned that switch degradation occurs when the building’s roof air-conditioning system is also running. All electromechanical systems emanate EMI. Thus you could alleviate the problem using EMI shielding.