Getting Smart with: sy0 401 vce

we provide Vivid CompTIA sy0 401 vce book which are the best for clearing comptia security+ sy0 401 pdf test, and to get certified by CompTIA CompTIA Security+ Certification. The sy0 401 practice test Questions & Answers covers all the knowledge points of the real sy0 401 practice test exam. Crack your CompTIA comptia sy0 401 Exam with latest dumps, guaranteed!


Free VCE & PDF File for CompTIA SY0-401 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on:

Q571. Which of the following is an important implementation consideration when deploying a wireless network that uses a shared password? 

A. Authentication server 

B. Server certificate 

C. Key length 

D. EAP method 



Key length is the main issue of concern since the wireless network uses a shared password. With risks of shared passwords makes the length of the password a crucial factor to risk mitigation. 

Q572. Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network? 

A. Security logs 

B. Protocol analyzer 

C. Audit logs 

D. Honeypot 



A honeypot is a system whose purpose it is to be attacked. An administrator can watch and study 

the attack to research current attack methodologies. 

According to the, a Honeypot luring a hacker into a system has several main 


The administrator can watch the hacker exploit the vulnerabilities of the system, thereby learning 

where the system has weaknesses that need to be redesigned. 

The hacker can be caught and stopped while trying to obtain root access to the system. 

By studying the activities of hackers, designers can better create more secure systems that are 

potentially invulnerable to future hackers. 

There are two main types of honeypots: 

Production – A production honeypot is one used within an organization's environment to help 

mitigate risk. 

Research – A research honeypot add value to research in computer security by providing a platform to study the threat. 

Q573. Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system? 

A. Input validation 

B. Network intrusion detection system 

C. Anomaly-based HIDS 

D. Peer review 



Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain. 

Q574. Pete, the system administrator, wishes to monitor and limit users’ access to external websites. 

Which of the following would BEST address this? 

A. Block all traffic on port 80. 

B. Implement NIDS. 

C. Use server load balancers. 

D. Install a proxy server. 



A proxy is a device that acts on behalf of other(s). In the interest of security, all internal user interaction with the Internet should be controlled through a proxy server. The proxy server should automatically block known malicious sites. The proxy server should cache often-accessed sites to improve performance. 

Q575. Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended? 

A. Screen lock 

B. Voice encryption 

C. GPS tracking 

D. Device encryption 



Screen-lock is a security feature that requires the user to enter a PIN or a password after a short period of inactivity before they can access the system again. This feature ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications. 

Q576. Which of the following malware types is MOST likely to execute its payload after Jane, an employee, has left the company? 

A. Rootkit 

B. Logic bomb 

C. Worm 

D. Botnet 



This is an example of a logic bomb. The logic bomb is configured to ‘go off’ or when Jane has left the company. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files should they ever be terminated from the company. Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Some viruses attack their host systems on specific dates, such as Friday the 13th or April Fool's Day. Trojans that activate on certain dates are often called "time bombs". To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software. As an example, trial programs with code that disables certain functionality after a set time are not normally regarded as logic bombs. 

Q577. The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and Standard Operating Procedures documentation in order to successfully respond to future incidents. Which of the following stages of the Incident Handling process is the team working on? 

A. Lessons Learned 

B. Eradication 

C. Recovery 

D. Preparation 



Incident response procedures involves: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Developing and updating all internal operating and standard operating procedures documentation to handle future incidents is preparation. 

Q578. An IT security technician is actively involved in identifying coding issues for her company. 

Which of the following is an application security technique that can be used to identify unknown weaknesses within the code? 

A. Vulnerability scanning 

B. Denial of service 

C. Fuzzing 

D. Port scanning 



Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 

Q579. Which of the following is the BEST reason to provide user awareness and training programs for organizational staff? 

A. To ensure proper use of social media 

B. To reduce organizational IT risk 

C. To detail business impact analyses 

D. To train staff on zero-days 



Ideally, a security awareness training program for the entire organization should cover the following areas: Importance of security Responsibilities of people in the organization Policies and procedures Usage policies Account and password-selection criteria Social engineering prevention 

You can accomplish this training either by using internal staff or by hiring outside trainers. This type of training will significantly reduce the organizational IT risk. 

Q580. During a disaster recovery planning session, a security administrator has been tasked with determining which threats and vulnerabilities pose a risk to the organization. Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organization? 

A. Hostile takeovers 

B. Large scale natural disasters 

C. Malware and viruses 

D. Corporate espionage