Act now and download your CompTIA security+ sy0 401 test today! Do not waste time for the worthless CompTIA sy0 401 practice test tutorials. Download Abreast of the times CompTIA CompTIA Security+ Certification exam with real questions and answers and begin to learn CompTIA comptia security+ sy0 401 with a classic professional.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA SY0-401 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/SY0-401-exam-dumps.html

Q301. Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone number displayed on the caller ID matches the vendor’s number. When the purchasing agent asks to call the vendor back, they are given a different phone number with a different area code. 

Which of the following attack types is this? 

A. Hoax 

B. Impersonation 

C. Spear phishing 

D. Whaling 

Answer:

Explanation: 

In this question, the impersonator is impersonating a vendor and asking for payment. They have managed to ‘spoof’ their calling number so that their caller ID matches the vendor’s number. Impersonation is where a person, computer, software application or service pretends to be someone or something it’s not. Impersonation is commonly non-maliciously used in client/server applications. However, it can also be used as a security threat. 


Q302. Which of the following describes the purpose of an MOU? 

A. Define interoperability requirements 

B. Define data backup process 

C. Define onboard/offboard procedure 

D. Define responsibilities of each party 

Answer:

Explanation: 

MOU or Memorandum of Understanding is a document outlining which party is responsible for what portion of the work. 


Q303. An information bank has been established to store contacts, phone numbers and other records. 

An application running on UNIX would like to connect to this index server using port 88. Which of the following authentication services would this use this port by default? 

A. Kerberos 

B. TACACS+ 

C. Radius 

D. LDAP 

Answer:

Explanation: Kerberos makes use of port 88. 


Q304. A security team has identified that the wireless signal is broadcasting into the parking lot. To reduce the risk of an attack against the wireless network from the parking lot, which of the following controls should be used? (Select TWO). 

A. Antenna placement 

B. Interference 

C. Use WEP 

D. Single Sign on 

E. Disable the SSID 

F. Power levels 

Answer: A,F 

Explanation: 

Placing the antenna in the correct position is crucial. You can then adjust the power levels to exclude the parking lot. 


Q305. Which of the following hardware based encryption devices is used as a part of multi-factor authentication to access a secured computing system? 

A. Database encryption 

B. USB encryption 

C. Whole disk encryption 

D. TPM 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Q306. A retail store uses a wireless network for its employees to access inventory from anywhere in the store. Due to concerns regarding the aging wireless network, the store manager has brought in a consultant to harden the network. During the site survey, the consultant discovers that the network was using WEP encryption. Which of the following would be the BEST course of action for the consultant to recommend? 

A. Replace the unidirectional antenna at the front of the store with an omni-directional antenna. 

B. Change the encryption used so that the encryption protocol is CCMP-based. 

C. Disable the network's SSID and configure the router to only access store devices based on MAC addresses. 

D. Increase the access point's encryption from WEP to WPA TKIP. 

Answer:

Explanation: 


Q307. The administrator receives a call from an employee named Joe. Joe says the Internet is down and he is receiving a blank page when typing to connect to a popular sports website. The administrator asks Joe to try visiting a popular search engine site, which Joe reports as successful. Joe then says that he can get to the sports site on this phone. Which of the following might the administrator need to configure? 

A. The access rules on the IDS 

B. The pop up blocker in the employee’s browser 

C. The sensitivity level of the spam filter 

D. The default block page on the URL filter 

Answer:

Explanation: 

A URL filter is used to block access to a site based on all or part of a URL. There are a number of URL-filtering tools that can acquire updated master URL block lists from vendors, as well as allow administrators to add or remove URLs from a custom list. 


Q308. Which of the following, if properly implemented, would prevent users from accessing files that are unrelated to their job duties? (Select TWO). 

A. Separation of duties 

B. Job rotation 

C. Mandatory vacation 

D. Time of day restrictions 

E. Least privilege 

Answer: A,E 

Explanation: 


Q309. While securing a network it is decided to allow active FTP connections into the network. Which of the following ports MUST be configured to allow active FTP connections? (Select TWO). 

A. 20 

B. 21 

C. 22 

D. 68 

E. 69 

Answer: A,B 

Explanation: 


Q310. Which of the following is a control that allows a mobile application to access and manipulate information which should only be available by another application on the same mobile device (e.g. a music application posting the name of the current song playing on the device on a social media site)? 

A. Co-hosted application 

B. Transitive trust 

C. Mutually exclusive access 

D. Dual authentication 

Answer:

Explanation: