sy0 401 vce? Tips for success

Virtual of comptia security+ study guide sy0 401 rapidshare materials and questions for CompTIA certification for customers, Real Success Guaranteed with Updated comptia sy0 401 pdf dumps vce Materials. 100% PASS CompTIA Security+ Certification exam Today!


Free VCE & PDF File for CompTIA SY0-401 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on:

Q671. Which of the following devices is BEST suited for servers that need to store private keys? 

A. Hardware security module 

B. Hardened network firewall 

C. Solid state disk drive 

D. Hardened host firewall 



A hardware security module (HSM) is a physical computing device that safeguards and manages 

digital keys for strong authentication and provides cryptoprocessing. 

By adding a HSM to the server and storing the private keys on HSM, the security of the keys 

would be improved. 

Q672. Which of the following pseudocodes can be used to handle program exceptions? 

A. If program detects another instance of itself, then kill program instance. 

B. If user enters invalid input, then restart program. 

C. If program module crashes, then restart program module. 

D. If user’s input exceeds buffer length, then truncate the input. 



Exception handling is an aspect of secure coding. When errors occur, the system should revert back to a secure state. This must be coded into the system by the programmer, and should capture all errors and exceptions that could cause the application or its modules to crash. Restarting the application or module would ensure that the application reverts back to a secure state. 

Q673. The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following? 

A. Rainbow tables attacks 

B. Brute force attacks 

C. Birthday attacks 

D. Cognitive passwords attacks 



Social Networking Dangers are ‘amplified’ in that social media networks are designed to mass distribute personal messages. If an employee reveals too much personal information it would be easy for miscreants to use the messages containing the personal information to work out possible passwords. 

Q674. Which of the following solutions provides the most flexibility when testing new security controls prior to implementation? 

A. Trusted OS 

B. Host software baselining 

C. OS hardening 

D. Virtualization 



Virtualization is used to host one or more operating systems in the memory of a single host computer and allows multiple operating systems to run simultaneously on the same hardware. Virtualization offers the flexibility of quickly and easily making backups of entire virtual systems, and quickly recovering the virtual system when errors occur. Furthermore, malicious code compromises of virtual systems rarely affect the host system, which allows for safer testing and experimentation. 

Q675. Due to issues with building keys being duplicated and distributed, a security administrator wishes to change to a different security control regarding a restricted area. The goal is to provide access based upon facial recognition. Which of the following will address this requirement? 

A. Set up mantraps to avoid tailgating of approved users. 

B. Place a guard at the entrance to approve access. 

C. Install a fingerprint scanner at the entrance. 

D. Implement proximity readers to scan users’ badges. 



A guard can be instructed to deny access until authentication has occurred will address the situation adequately. 

Q676. Pete’s corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. 

Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent? 

A. Collusion 

B. Impersonation 

C. Pharming 

D. Transitive Access 



Impersonation is where a person, computer, software application or service pretends to be someone or something it’s not. Impersonation is commonly non-maliciously used in client/server applications. However, it can also be used as a security threat. 

The procedure the users have to go through is to ensure that the technician who will have access to the computer is a genuine technician and not someone impersonating a technician. 

Q677. An administrator has to determine host operating systems on the network and has deployed a transparent proxy. Which of the following fingerprint types would this solution use? 

A. Packet 

B. Active 

C. Port 

D. Passive 



Q678. Which of the following should be performed to increase the availability of IP telephony by prioritizing traffic? 

A. Subnetting 


C. Quality of service 




Quality of Service (QoS) facilitates the deployment of media-rich applications, such as video conferencing and Internet Protocol (IP) telephony, without adversely affecting network throughput. 

Q679. Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent? 

A. Warm site 

B. Load balancing 

C. Clustering 




Anytime you connect multiple computers to work/act together as a single server, it is known as 

clustering. Clustered systems utilize parallel processing (improving performance and availability) 

and add redundancy. 

Server clustering is used to provide failover capabilities / redundancy in addition to scalability as 

demand increases. 

Q680. During an anonymous penetration test, Jane, a system administrator, was able to identify a shared print spool directory, and was able to download a document from the spool. Which statement BEST describes her privileges? 

A. All users have write access to the directory. 

B. Jane has read access to the file. 

C. All users have read access to the file. 

D. Jane has read access to the directory. 



The question states that Jane was able to download a document from the spool directory. To view and download the document, Jane must have at least Read access to the file. The fact that the document belonged to someone else suggests that all users have read access to the file.