Get Smart with sy0 401 study guide pdf

Proper study guides for Most recent CompTIA CompTIA Security+ Certification certified begins with CompTIA security+ sy0 401 preparation products which designed to deliver the Refined comptia sy0 401 questions by making you pass the sy0 401 vce test at your first time. Try the free sy0 401 practice test demo right now.

2018 NEW RECOMMEND

Free VCE & PDF File for CompTIA SY0-401 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/SY0-401-dumps.html

Q231. A user commuting to work via public transport received an offensive image on their smart phone from another commuter. Which of the following attacks MOST likely took place? 

A. War chalking 

B. Bluejacking 

C. War driving 

D. Bluesnarfing 

Answer:

Explanation: 

The question states that the ‘attack’ took place on public transport and was received on a smartphone. Therefore, it is most likely that the image was sent using Bluetooth. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters. Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in guerrilla marketing campaigns to promote advergames. 

Q232. Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network printing? 

A. Port security 

B. Flood guards 

C. Loop protection 

D. Implicit deny 

Answer:

Explanation: 

Implicit deny says that if you aren’t explicitly granted access or privileges for a resource, you’re denied access by default. The scenario does not state that network printing is allowed in the router access list, therefore, it must be denied by default. 

Q233. A security engineer, Joe, has been asked to create a secure connection between his mail server and the mail server of a business partner. Which of the following protocol would be MOST appropriate? 

A. HTTPS 

B. SSH 

C. FTP 

D. TLS 

Answer:

Explanation: Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom it is communicating, and to exchange a symmetric key. The TLS protocol allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering. 

Q234. The network administrator is responsible for promoting code to applications on a DMZ web server. Which of the following processes is being followed to ensure application integrity? 

A. Application hardening 

B. Application firewall review 

C. Application change management 

D. Application patch management 

Answer:

Explanation: 

Change management is the structured approach that is followed to secure a company’s assets. 

Promoting code to application on a SMZ web server would be change management. 

Q235. An administrator has advised against the use of Bluetooth phones due to bluesnarfing concerns. 

Which of the following is an example of this threat? 

A. An attacker using the phone remotely for spoofing other phone numbers 

B. Unauthorized intrusions into the phone to access data 

C. The Bluetooth enabled phone causing signal interference with the network 

D. An attacker using exploits that allow the phone to be disabled 

Answer:

Explanation: 

Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information — such as the user's calendar, contact list and e-mail and text messages –without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled. 

Q236. Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate? 

A. War dialing 

B. War chalking 

C. War driving 

D. Bluesnarfing 

Answer:

Explanation: 

War dialing is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems and fax machines. Hackers use the resulting lists for various purposes: hobbyists for exploration, and crackers – malicious hackers who specialize in computer security – for guessing user accounts (by capturing voicemail greetings), or locating modems that might provide an entry-point into computer or other electronic systems. It may also be used by security personnel, for example, to detect unauthorized devices, such as modems or faxes, on a company's telephone network. 

Q237. Verifying the integrity of data submitted to a computer program at or during run-time, with the intent of preventing the malicious exploitation of unintentional effects in the structure of the code, is BEST described as which of the following? 

A. Output sanitization 

B. Input validation 

C. Application hardening 

D. Fuzzing 

Answer:

Explanation: 

Q238. A supervisor in the human resources department has been given additional job duties in the accounting department. Part of their new duties will be to check the daily balance sheet calculations on spreadsheets that are restricted to the accounting group. In which of the following ways should the account be handled? 

A. The supervisor should be allowed to have access to the spreadsheet files, and their membership in the human resources group should be terminated. 

B. The supervisor should be removed from the human resources group and added to the accounting group. 

C. The supervisor should be added to the accounting group while maintaining their membership in the human resources group. 

D. The supervisor should only maintain membership in the human resources group. 

Answer:

Explanation: 

You can assign permissions to access resources either to a user or a group. The most efficient way is to assign permissions to a group (group based privileges). By assigning the human resources supervisor’s user account to the group means the supervisor will inherit the permissions of that group, and allow him to carry out the new duties. Because the new duties are being added to his normal duties, maintaining membership in the human resources group will allow the supervisor to continue performing his normal duties. 

Q239. Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed? 

A. Bollards 

B. Video surveillance 

C. Proximity readers 

D. Fencing 

Answer:

Explanation: 

Q240. Digital Signatures provide which of the following? 

A. Confidentiality 

B. Authorization 

C. Integrity 

D. Authentication 

E. Availability 

Answer:

Explanation: 

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender.