★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


You can save a lot more time if you utilize the CompTIA SY0-401 study manual. To put the idea another approach, you dont must spend significantly time in reading those lengthy books. Our own CompTIA CompTIA SY0-401 dumps also contain numerous wonderful simulated questions. The simulated questions are generally merged into the SY0-401 questions and answers of the CompTIA SY0-401 study guides. Its extremely convenient for you to prepare the exam together with our amazing SY0-401 materials. All of us make sure that you will certainly definitely attain success provided that you place pace together with our CompTIA certification review materials. Needless to say, you should have a vast knowledge about the course first of all. The a lot more you review the SY0-401 review materials, the nearer to your destination. The actual CompTIA SY0-401 books or the eBooks are generally portable, so you can take them anyplace and anytime you would like. You have a great access on the CompTIA study manual for additional assistance. We guarantee the clients absolute achievement due to ultimate, authentic and excellent materials.

2021 Aug exam sy0-401 pdf:

Q691. Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the following attacks? (Select TWO). 

A. Spoofing 

B. Man-in-the-middle 

C. Dictionary 

D. Brute force 

E. Privilege escalation 

Answer: C,D 

Explanation: 

Account lockout is a useful method for slowing down online password-guessing attacks. A dictionary attack performs password guessing by making use of a pre-existing list of likely passwords. A brute-force attack is intended to try every possible valid combination of characters to create possible passwords in the attempt to discover the specific passwords used by user accounts. 


Q692. Several employee accounts appear to have been cracked by an attacker. Which of the following should the security administrator implement to mitigate password cracking attacks? (Select TWO). 

A. Increase password complexity 

B. Deploy an IDS to capture suspicious logins 

C. Implement password history 

D. Implement monitoring of logins 

E. Implement password expiration 

F. Increase password length 

Answer: A,F 

Explanation: 

The more difficult a password is the more difficult it is to be cracked by an attacker. By increasing 

the password complexity you make it more difficult. 

Passwords that are too short can easily be cracked. The more characters used in a password, 

combined with the increased complexity will mitigate password cracking attacks. 


Q693. In the case of a major outage or business interruption, the security office has documented the expected loss of earnings, potential fines and potential consequence to customer service. Which of the following would include the MOST detail on these objectives? 

A. Business Impact Analysis 

B. IT Contingency Plan 

C. Disaster Recovery Plan 

D. Continuity of Operations 

Answer: A 

Explanation: 

Business impact analysis (BIA) is the process of evaluating all of the critical systems in an organization to define impact and recovery plans. BIA isn’t concerned with external threats or vulnerabilities; the analysis focuses on the impact a loss would have on the organization. A BIA comprises the following: identifying critical functions, prioritizing critical business functions, calculating a timeframe for critical systems loss, and estimating the tangible impact on the organization. 


Q694. Which of the following BEST describes a protective countermeasure for SQL injection? 

A. Eliminating cross-site scripting vulnerabilities 

B. Installing an IDS to monitor network traffic 

C. Validating user input in web applications 

D. Placing a firewall between the Internet and database servers 

Answer: C 

Explanation: 

By validating user input and preventing special characters, we can prevent the injection of client-side scripting code. SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. 


Q695. The security administrator is analyzing a user’s history file on a Unix server to determine if the user was attempting to break out of a rootjail. Which of the following lines in the user’s history log shows evidence that the user attempted to escape the rootjail? 

A. cd ../../../../bin/bash 

B. whoami 

C. ls /root 

D. sudo -u root 

Answer: A 

Explanation: 

On modern UNIX variants, including Linux, you can define the root directory on a perprocess basis. The chroot utility allows you to run a process with a root directory other than /. The root directory appears at the top of the directory hierarchy and has no parent: A process cannot access any files above the root directory (because they do not exist). If, for example, you run a program (process) and specify its root directory as /home/sam/jail, the program would have no concept of any files in /home/sam or above: jail is the program's root directory and is labeled / (not jail). By creating an artificial root directory, frequently called a (chroot) jail, you prevent a program from accessing or modifying—possibly maliciously—files outside the directory hierarchy starting at its root. You must set up a chroot jail properly to increase security: If you do not set up the chroot jail correctly, you can actually make it easier for a malicious user to gain access to a system than if there were no chroot jail. 

The command cd.. takes you up one level in the directory structure. Repeated commands would take you to the top level the root which is represented by a forward slash /. The command /bin/bash is an attempt to run the bash shell from the root level. 


SY0-401 dumps

Improved comptia security+ get certified get ahead sy0-401 study guide download:

Q696. While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make sure that only devices authorized to access the network would be permitted to login and utilize resources. Which of the following should the administrator implement to ensure this happens? 

A. Log Analysis 

B. VLAN Management 

C. Network separation 

D. 802.1x 

Answer: D 

Explanation: 

802.1x is a port-based authentication mechanism. It’s based on Extensible Authentication Protocol (EAP) and is commonly used in closed-environment wireless networks. 802.1x was initially used to compensate for the weaknesses of Wired Equivalent Privacy (WEP), but today it’s often used as a component in more complex authentication and connection-management systems, including Remote Authentication Dial-In User Service (RADIUS), Diameter, Cisco System’s Terminal Access Controller Access-Control System Plus (TACACS+), and Network Access Control (NAC). 


Q697. Two members of the finance department have access to sensitive information. The company is concerned they may work together to steal information. Which of the following controls could be implemented to discover if they are working together? 

A. Least privilege access 

B. Separation of duties 

C. Mandatory access control 

D. Mandatory vacations 

Answer: D 

Explanation: 

A mandatory vacation policy requires all users to take time away from work to refresh. Mandatory vacation give the employee a chance to refresh, but it also gives the company a chance to make sure that others can fill in any gaps in skills and satisfies the need to have replication or duplication at all levels. Mandatory vacations also provide an opportunity to discover fraud. In this case mandatory vacations can prevent the two members from colluding to steal the information that they have access to. 


Q698. Which of the following network architecture concepts is used to securely isolate at the boundary between networks? 

A. VLAN 

B. Subnetting 

C. DMZ 

D. NAT 

Answer: C 

Explanation: 

A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall. 


Q699. HOTSPOT 

Select the appropriate attack from each drop down list to label the corresponding illustrated attack 

Instructions: Attacks may only be used once, and will disappear from drop down list if selected. 

When you have completed the simulation, please select the Done button to submit. 



Answer: 


Explanation: 

References: 

http://searchsecurity.techtarget.com/definition/spear-phishing http://www.webopedia.com/TERM/V/vishing.html http://www.webopedia.com/TERM/P/phishing.html 

http://www.webopedia.com/TERM/P/pharming.html 


Q700. Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails resulting in system outages? 

A. Risk transference 

B. Change management 

C. Configuration management 

D. Access control revalidation 

Answer: B 

Explanation: 

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. In this case ‘scheduled system patching’.