Want to Pass SY0-401 Exam In Next HOURS? Get it now →
May 18, 2017

comptia sy0 401 (31 to 40)

It is impossible to pass CompTIA sy0 401 study guide pdf exam without any help in the short term. Come to Ucertify soon and find the most advanced, correct and guaranteed CompTIA comptia security+ sy0 401 pdf practice questions. You will get a surprising result by our Latest CompTIA Security+ Certification practice guides.

Q31. ON NO: 161 

If you don’t know the MAC address of a Linux-based machine, what command-line utility can you use to ascertain it? 

A. macconfig 

B. ifconfig 

C. ipconfig 

D. config 

Answer:

Explanation: 

To find MAC address of a Unix/Linux workstation, use ifconfig or ip a. 


Q32. Which of the following is best practice to put at the end of an ACL? 

A. Implicit deny 

B. Time of day restrictions 

C. Implicit allow 

D. SNMP string 

Answer:

Explanation: 

An implicit deny clause is implied at the end of each ACL. This implies that if you aren’t specifically granted access or privileges for a resource, you’re denied access by default. The implicit deny clause is set by the system. 


Q33. RC4 is a strong encryption protocol that is generally used with which of the following? 

A. WPA2 CCMP 

B. PEAP 

C. WEP 

D. EAP-TLS 

Answer:

Explanation: 


Q34. A security administrator develops a web page and limits input into the fields on the web page as well as filters special characters in output. The administrator is trying to prevent which of the following attacks? 

A. Spoofing 

B. XSS 

C. Fuzzing 

D. Pharming 

Answer:

Explanation: 

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users. Cross-site scripting uses known vulnerabilities in web-based applications, their servers, or plug-in systems on which they rely. Exploiting one of these, attackers fold malicious content into the content being delivered from the compromised site. When the resulting combined content arrives at the client-side web browser, it has all been delivered from the trusted source, and thus operates under the permissions granted to that system. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access-privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. 

By validating user input and preventing special characters, we can prevent the injection of client-side scripting code. 


Q35. A network technician is on the phone with the system administration team. Power to the server room was lost and servers need to be restarted. The DNS services must be the first to be restarted. Several machines are powered off. Assuming each server only provides one service, which of the following should be powered on FIRST to establish DNS services? 

A. Bind server 

B. Apache server 

C. Exchange server 

D. RADIUS server 

Answer:

Explanation: 

BIND (Berkeley Internet Name Domain) is the most widely used Domain Name System (DNS) software on the Internet. It includes the DNS server component contracted for name daemon. This is the only option that directly involves DNS. 


Q36. Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websites? 

A. 21 

B. 25 

C. 80 

D. 3389 

Answer:

Explanation: 

Port 80 is used by HTTP, which is the foundation of data communication for the World Wide Web. 


Q37. Ann, the security administrator, wishes to implement multifactor security. Which of the following should be implemented in order to compliment password usage and smart cards? 

A. Hard tokens 

B. Fingerprint readers 

C. Swipe badge readers 

D. Passphrases 

Answer:

Explanation: 

A multifactor authentication method uses two or more processes for logon. A twofactor method might use smart cards and biometrics for logon. For obvious reasons, the two or more factors employed should not be from the same category. 


Q38. Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO). 

A. Disable the USB root hub within the OS. 

B. Install anti-virus software on the USB drives. 

C. Disable USB within the workstations BIOS. 

D. Apply the concept of least privilege to USB devices. 

E. Run spyware detection against all workstations. 

Answer: A,C 

Explanation: 

A: The USB root hub can be disabled from within the operating system. 

C: USB can also be configured and disabled in the system BIOS. 


Q39. A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this? 

A. Command shell restrictions 

B. Restricted interface 

C. Warning banners 

D. Session output pipe to /dev/null 

Answer:

Explanation: 

Within Microsoft Windows, you have the ability to put signs (in the form of onscreen pop-up banners) that appear before the login telling similar information—authorized access only, violators will be prosecuted, and so forth. Such banners convey warnings or regulatory information to the user that they must “accept” in order to use the machine or network. You need to make staff aware that they may legally be prosecuted and a message is best given via a banner so that all staff using workstation will get notification. 


Q40. Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host? 

A. Installing anti-malware 

B. Implementing an IDS 

C. Taking a baseline configuration 

D. Disabling unnecessary services 

Answer:

Explanation: 

Preventive controls are to stop something from happening. These can include locked doors that keep intruders out, user training on potential harm (to keep them vigilant and alert), or even biometric devices and guards that deny access until authentication has occurred. By disabling all unnecessary services you would be reducing the attack surface because then there is less opportunity for risk incidents to happen. There are many risks with having many services enabled since a service can provide an attack vector that someone could exploit against your system. It is thus best practice to enable only those services that are absolutely required. 



see more http://www.ubraindumps.com/SY0-401-dumps/