how to use lead2pass sy0-401

Exam Code: SY0-401 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Security+ Certification
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass SY0-401 Exam.

2016 Jun SY0-401 Study Guide Questions:

Q551. A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to each password before the password is hashed. This technique is known as: 

A. Symmetric cryptography. 

B. Private key cryptography. 

C. Salting. 

D. Rainbow tables. 

Answer: C 


Salting can be used to strengthen the hashing when the passwords were encrypted. Though hashing is a one-way algorithm it does not mean that it cannot be hacked. One method to hack a hash is though rainbow tables and salt is the counter measure to rainbow tables. With salt a password that you typed in and that has been encrypted with a hash will yield a letter combination other than what you actually types in when it is rainbow table attacked. 

Q552. Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department’s server, and the accounting department should not have access to the HR department’s server. The network is separated by switches. Which of the following is designed to keep the HR department users from accessing the accounting department’s server and vice-versa? 

A. ACLs 


C. DMZs 


Answer: B 


A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function. 

Q553. A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by camouflaging data inside of other files? 

A. Integrity 

B. Confidentiality 

C. Steganography 

D. Availability 

Answer: C 


Steganography is the process of concealing a file, message, image, or video within another file, message, image, or video. Note: The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable will arouse interest, and may in themselves be incriminating in countries where encryption is illegal. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. 

SY0-401  practice question

Updated sy0-401 voucher:

Q554. A security engineer is reviewing log data and sees the output below: 

POST: /payload.php HTTP/1.1 HOST: localhost Accept: */* Referrer: http://localhost/ ******* HTTP/1.1 403 Forbidden Connection: close 

Log: Access denied with 403. Pattern matches form bypass Which of the following technologies was MOST likely being used to generate this log? 

A. Host-based Intrusion Detection System 

B. Web application firewall 

C. Network-based Intrusion Detection System 

D. Stateful Inspection Firewall 

E. URL Content Filter 

Answer: B 


A web application firewall is a device, server add-on, virtual service, or system filter that defines a strict set of communication rules for a website and all visitors. It’s intended to be an application-specific firewall to prevent cross-site scripting, SQL injection, and other web application attacks. 

Q555. Which of the following identifies certificates that have been compromised or suspected of being compromised? 

A. Certificate revocation list 

B. Access control list 

C. Key escrow registry 

D. Certificate authority 

Answer: A 


Certificates that have been compromised or are suspected of being compromised are revoked. A CRL is a locally stored record containing revoked certificates and revoked keys. 

Q556. Which of the following tools would allow Ann, the security administrator, to be able to BEST quantify all traffic on her network? 

A. Honeypot 

B. Port scanner 

C. Protocol analyzer 

D. Vulnerability scanner 

Answer: C 


A Protocol Analyzer is a hardware device or more commonly a software program used to capture 

network data communications sent between devices on a network. By capturing and analyzing the 

packets sent between the systems on the network, Ann would be able to quantify the amount of 

traffic on the network. 

Well known software protocol analyzers include Message Analyzer (formerly Network Monitor) 

from Microsoft and Wireshark (formerly Ethereal). 

SY0-401  practice question

Real exam sy0-401:

Q557. The system administrator has been notified that many users are having difficulty connecting to the company’s wireless network. They take a new laptop and physically go to the access point and connect with no problems. Which of the following would be the MOST likely cause? 

A. The certificate used to authenticate users has been compromised and revoked. 

B. Multiple war drivers in the parking lot have exhausted all available IPs from the pool to deny access. 

C. An attacker has gained access to the access point and has changed the encryption keys. 

D. An unauthorized access point has been configured to operate on the same channel. 

Answer: D 


Wireless Access Points can be configured to use a channel. If you have multiple access points within range of each other, you should configure the access points to use different channels. Different channels use different frequencies. If you have two access points using the same channel, their wifi signals will interfere with each other. The question states that that many users are having difficulty connecting to the company’s wireless network. This is probably due to the signal being weakened by interference from another access point using the same channel. When the administrator takes a new laptop and physically goes to the access point and connects with no problems, he is able to connect because he is near the access point and therefore has a strong signal. 

Q558. Joe, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Joe insisted that he was not aware of any company policy that prohibits the use of such web sites. Which of the following is the BEST method to deter employees from the improper use of the company’s information systems? 

A. Acceptable Use Policy 

B. Privacy Policy 

C. Security Policy 

D. Human Resource Policy 

Answer: A 


Acceptable use policies (AUPs) describe how the employees in an organization can use company systems and resources, both software and hardware. 

Q559. Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks? 

A. Protocol filter 

B. Load balancer 


D. Layer 7 firewall 

Answer: D 


An application-level gateway firewall filters traffic based on user access, group membership, the application or service used, or even the type of resources being transmitted. This type of firewall operates at the Application layer (Layer 7) of the OSI model. 

Q560. An information bank has been established to store contacts, phone numbers and other records. A UNIX application needs to connect to the index server using port 389. Which of the following authentication services should be used on this port by default? 


B. Kerberos 



Answer: D 


LDAP makes use of port 389. 

About SY0-401 Information: SY0-401 Dumps