Improved SY0-401 vce Guide

Act now and download your CompTIA SY0-401 test today! Do not waste time for the worthless CompTIA SY0-401 tutorials. Download Updated CompTIA CompTIA Security+ Certification exam with real questions and answers and begin to learn CompTIA SY0-401 with a classic professional.

2017 Mar SY0-401 Study Guide Questions:

Q421. Pete, the system administrator, has concerns regarding users losing their company provided smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his concerns? 

A. Enforce device passwords. 

B. Use remote sanitation. 

C. Enable GPS tracking. 

D. Encrypt stored data. 

Answer: C 


Global Positioning System (GPS) tracking can be used to identify its location of a stolen device and can allow authorities to recover the device. However, for GPS tracking to work, the device must have an Internet connection or a wireless phone service over which to send its location information. 

Q422. Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company? 

A. Privacy Policy 

B. Least Privilege 

C. Acceptable Use 

D. Mandatory Vacations 

Answer: D 


A mandatory vacation policy requires all users to take time away from work to refresh. But not only does mandatory vacation give the employee a chance to refresh, but it also gives the company a chance to make sure that others can fill in any gaps in skills and satisfies the need to have replication or duplication at all levels as well as an opportunity to discover fraud. 

Q423. Which of the following helps to establish an accurate timeline for a network intrusion? 

A. Hashing images of compromised systems 

B. Reviewing the date of the antivirus definition files 

C. Analyzing network traffic and device logs 

D. Enforcing DLP controls at the perimeter 

Answer: C 


SY0-401  test questions

Leading SY0-401 download:


A security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. Drag and drop the applicable controls to each asset type. 

Instructions: Controls can be used multiple times and not all placeholders need to be filled. When you have completed the simulation, please select the Done button to submit. 




Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, 

Indianapolis, 2014, pp 221, 222, 369, 418 

Q425. A network administrator uses an RFID card to enter the datacenter, a key to open the server rack, and a username and password to logon to a server. These are examples of which of the following? 

A. Multifactor authentication 

B. Single factor authentication 

C. Separation of duties 

D. Identification 

Answer: B 


Single-factor authentication (SFA) is a process for securing access to a given system by identifying the party requesting access via a single category of credentials. In this case, the network administrator makes use of an RFID card to access the datacenter, a key to access the server rack, and a username and password to access a server. 

Q426. While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks? 

A. Cross-site scripting 

B. Buffer overflow 

C. Header manipulation 

D. Directory traversal 

Answer: B 


When the user opens an attachment, the attachment is loaded into memory. The error is caused by a memory issue due to a buffer overflow attack. 

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information – which has to go somewhere – can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability.

Simulation SY0-401 Q&A:

Q427. Which of the following techniques can be used to prevent the disclosure of system information resulting from arbitrary inputs when implemented properly? 

A. Fuzzing 

B. Patch management 

C. Error handling 

D. Strong passwords 

Answer: C 


Exception handling is an aspect of secure coding. When errors occur, the system should revert back to a secure state. This must be coded into the system by the programmer, and should capture errors and exceptions so that they could be handled by the application. 

Q428. Which of the following is a vulnerability associated with disabling pop-up blockers? 

A. An alert message from the administrator may not be visible 

B. A form submitted by the user may not open 

C. The help window may not be displayed 

D. Another browser instance may execute malicious code 

Answer: D 

Explanation: Pop-up blockers prevent websites from opening new browser windows without the users consent. These are often used for advertisements but can also be used to distribute malicious code. 

Q429. Using proximity card readers instead of the traditional key punch doors would help to mitigate: 

A. Impersonation 

B. Tailgating 

C. Dumpster diving 

D. Shoulder surfing 

Answer: D 


Using a traditional key punch door, a person enters a code into a keypad to unlock the door. Someone could be watching the code being entered. They would then be able to open the door by entering the code. The process of watching the key code being entered is known as shoulder surfing. 

Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is an effective way to get information in crowded places because it's relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done long distance with the aid of binoculars or other vision-enhancing devices. To prevent shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand. 

Q430. A new MPLS network link has been established between a company and its business partner. 

The link provides logical isolation in order to prevent access from other business partners. Which of the following should be applied in order to achieve confidentiality and integrity of all data across the link? 

A. MPLS should be run in IPVPN mode. 

B. SSL/TLS for all application flows. 

C. IPSec VPN tunnels on top of the MPLS link. 

D. HTTPS and SSH for all application flows. 

Answer: C 


IPSec can very well be used with MPLS. IPSec could provide VPN tunnels on top if the MPLS link. Internet Protocol Security (IPSec) isn’t a tunneling protocol, but it’s used in conjunction with tunneling protocols. IPSec is oriented primarily toward LAN-to-LAN connections, but it can also be used with dial-up connections. IPSec provides secure authentication and encryption of data and headers; this makes it a good choice for security. 

About SY0-401 Information: SY0-401 Dumps