★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Actual of SY0-401 exam fees materials and cram for CompTIA certification for candidates, Real Success Guaranteed with Updated SY0-401 pdf dumps vce Materials. 100% PASS CompTIA Security+ Certification exam Today!

2021 Aug security+ sy0-401:

Q161. Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign the file? 

A. Joe’s public key 

B. Joe’s private key 

C. Ann’s public key 

D. Ann’s private key 

Answer: D 

Explanation: 

The sender uses his private key, in this case Ann's private key, to create a digital signature. The message is, in effect, signed with the private key. The sender then sends the message to the receiver. The receiver uses the public key attached to the message to validate the digital signature. If the values match, the receiver knows the message is authentic. The receiver uses a key provided by the sender—the public key—to decrypt the message. Most digital signature implementations also use a hash to verify that the message has not been altered, intentionally or accidently, in transit. 


Q162. Which of the following provides additional encryption strength by repeating the encryption process with additional keys? 

A. AES 

B. 3DES 

C. TwoFish 

D. Blowfish 

Answer: B 

Explanation: 

Triple-DES (3DES) is a technological upgrade of DES. 3DES is still used, even though AES is the preferred choice for government applications. 3DES is considerably harder to break than many other systems, and it’s more secure than DES. It increases the key length to 168 bits (using three 56-bit DES keys). 


Q163. While rarely enforced, mandatory vacation policies are effective at uncovering: 

A. Help desk technicians with oversight by multiple supervisors and detailed quality control systems. 

B. Collusion between two employees who perform the same business function. 

C. Acts of incompetence by a systems engineer designing complex architectures as a member of a team. 

D. Acts of gross negligence on the part of system administrators with unfettered access to system and no oversight. 

Answer: D 

Explanation: 

Least privilege (privilege reviews) and job rotation is done when mandatory vacations are implemented. Then it will uncover areas where the system administrators neglected to check all users’ privileges since the other users must fill in their positions when they are on their mandatory vacation. 


Q164. A company hired Joe, an accountant. The IT administrator will need to create a new account for 

Joe. The company uses groups for ease of management and administration of user accounts. 

Joe will need network access to all directories, folders and files within the accounting department. 

Which of the following configurations will meet the requirements? 

A. Create a user account and assign the user account to the accounting group. 

B. Create an account with role-based access control for accounting. 

C. Create a user account with password reset and notify Joe of the account creation. 

D. Create two accounts: a user account and an account with full network administration rights. 

Answer: B 

Explanation: 

Role-based Access Control is basically based on a user’s job description. When a user is assigned a specific role in an environment, that user’s access to objects is granted based on the required tasks of that role. The IT administrator should, therefore, create an account with role-based access control for accounting for Joe. 


Q165. A security analyst noticed a colleague typing the following command: 

`Telnet some-host 443’ 

Which of the following was the colleague performing? 

A. A hacking attempt to the some-host web server with the purpose of achieving a distributed denial of service attack. 

B. A quick test to see if there is a service running on some-host TCP/443, which is being routed correctly and not blocked by a firewall. 

C. Trying to establish an insecure remote management session. The colleague should be using SSH or terminal services instead. 

D. A mistaken port being entered because telnet servers typically do not listen on port 443. 

Answer: B 

Explanation: 

B: The Telnet program parameters are: telnet <hostname> <port> 

<hostname> is the name or IP address of the remote server to connect to. 

<port> is the port number of the service to use for the connection. 

TCP port 443 provides the HTTPS (used for secure web connections) service; it is the default SSL 

port. By running the Telnet some-host 443 command, the security analyst is checking that routing 

is done properly and not blocked by a firewall. 


SY0-401 free question

Improved actual test sy0-401:

Q166. A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file was found on an underused server and appears to contain a zero-day exploit. Which of the following can the researcher do to determine if the file is malicious in nature? 

A. TCP/IP socket design review 

B. Executable code review 

C. OS Baseline comparison 

D. Software architecture review 

Answer: C 

Explanation: 

Zero-Day Exploits begin exploiting holes in any software the very day it is discovered. It is very difficult to respond to a zero-day exploit. Often, the only thing that you as a security administrator can do is to turn off the service. Although this can be a costly undertaking in terms of productivity, it is the only way to keep the network safe. In this case you want to check if the executable file is malicious. Since a baseline represents a secure state is would be possible to check the nature of the executable file in an isolated environment against the OS baseline. 


Q167. The data security manager is notified that a client will be sending encrypted information on optical discs for import into the company database. Once imported, the information is backed up and the discs are no longer needed. Following the import, which of the following is the BEST action for the manager to take? 

A. Wipe the discs and place into inventory for future use 

B. Send the discs back to the client 

C. Contract with a third party to shred the discs 

D. Instruct employees to store the discs in a secure area 

Answer: B 

Explanation: 


Q168.  

Which of the following would be MOST appropriate if an organization's requirements mandate complete control over the data and applications stored in the cloud? 

A. Hybrid cloud 

B. Community cloud 

C. Private cloud 

D. Public cloud 

Answer: C 

Explanation: 


Q169. Connections using point-to-point protocol authenticate using which of the following? (Select TWO). 

A. RIPEMD 

B. PAP 

C. CHAP 

D. RC4 

E. Kerberos 

Answer: B,C 

Explanation: 

B: A password authentication protocol (PAP) is an authentication protocol that uses a password. PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. 

C: CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. 


Q170. A company is installing a new security measure that would allow one person at a time to be authenticated to an area without human interaction. Which of the following does this describe? 

A. Fencing 

B. Mantrap 

C. A guard 

D. Video surveillance 

Answer: B 

Explanation: 

Mantraps make use of electronic locks and are designed to allow you to limit the amount of individual allowed access to an area at any one time.