aiotestking uk

SY0-401 Exam Questions - Online Test


SY0-401 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Mike, a user, states that he is receiving several unwanted emails about home loans. Which of the following is this an example of? 

A. Spear phishing 

B. Hoaxes 

C. Spoofing 

D. Spam 

Answer:

Explanation: 

Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally email advertising for some product sent to a mailing list or newsgroup. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers. There is some debate about why it is called spam, but the generally accepted version is that it comes from the Monty Python song, "Spam spam spam spam, spam spam spam spam, lovely spam, wonderful spam". Like the song, spam is an endless repetition of worthless text. Another school of thought maintains that it comes from the computer group lab at the University of Southern California who gave it the name because it has many of the same characteristics as the lunch meat Spam: Nobody wants it or ever asks for it. No one ever eats it; it is the first item to be pushed to the side when eating the entree. Sometimes it is actually tasty, like 1% of junk mail that is really useful to some people. The term spam can also be used to describe any "unwanted" email from a company or website --typically at some point a user would have agreed to receive the email via subscription list opt-in --a newer term called graymail is used to describe this particular type of spam. 

Q2. A security administrator has deployed all laptops with Self Encrypting Drives (SED) and enforces key encryption. Which of the following represents the greatest threat to maintaining data confidentiality with these devices? 

A. Full data access can be obtained by connecting the drive to a SATA or USB adapter bypassing the SED hardware. 

B. A malicious employee can gain the SED encryption keys through software extraction allowing access to other laptops. 

C. If the laptop does not use a Secure Boot BIOS, the SED hardware is not enabled allowing full data access. 

D. Laptops that are placed in a sleep mode allow full data access when powered back on. 

Answer:

Explanation: 

Q3. A network administrator is asked to send a large file containing PII to a business associate. 

Which of the following protocols is the BEST choice to use? 

A. SSH 

B. SFTP 

C. SMTP 

D. FTP 

Answer:

Explanation: 

SFTP encrypts authentication and data traffic between the client and server by making use of SSH to provide secure FTP communications. As a result, SFTP offers protection for both the authentication traffic and the data transfer taking place between a client and server. 

Q4. Which of the following helps to apply the proper security controls to information? 

A. Data classification 

B. Deduplication 

C. Clean desk policy 

D. Encryption 

Answer:

Explanation: 

Information classification is done by confidentiality and comprises of three categories, namely: public use, internal use and restricted use. These categories make applying the appropriate policies and security controls practical. 

Q5. A server dedicated to the storage and processing of sensitive information was compromised with a rootkit and sensitive data was extracted. Which of the following incident response procedures is best suited to restore the server? 

A. Wipe the storage, reinstall the OS from original media and restore the data from the last known good backup. 

B. Keep the data partition, restore the OS from the most current backup and run a full system antivirus scan. 

C. Format the storage and reinstall both the OS and the data from the most current backup. 

D. Erase the storage, reinstall the OS from most current backup and only restore the data that was not compromised. 

Answer:

Explanation: 

Rootkits are software programs that have the ability to hide certain things from the operating system. With a rootkit, there may be a number of processes running on a system that do not show up in Task Manager or connections established or available that do not appear in a netstat display—the rootkit masks the presence of these items. The rootkit is able to do this by manipulating function calls to the operating system and filtering out information that would normally appear. Theoretically, rootkits could hide anywhere that there is enough memory to reside: video cards, PCI cards, and the like. The best way to handle this situation is to wipe the server and reinstall the operating system with the original installation disks and then restore the extracted data from your last known good backup. This way you can eradicate the rootkit and restore the data. 

Q6. An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files should be copied from srv4 to accomplish this? 

A. certificate, private key, and intermediate certificate chain 

B. certificate, intermediate certificate chain, and root certificate 

C. certificate, root certificate, and certificate signing request 

D. certificate, public key, and certificate signing request 

Answer:

Explanation: 

a wildcard certificate is a public key certificate which can be used with multiple subdomains of a domain. In public-key cryptography, the receiver has a private key known only to them; a public key corresponds to it, which they make known to others. The public key can be sent to all other parties; the private key is never divulged. A symmetric algorithm requires that receivers of the message use the same private key. Thus you should copy the certificate, the private key and the intermediate certificate chain from srv4 to srv5. 

Q7. Which of the following is a directional antenna that can be used in point-to-point or point-to-multi-point WiFi communication systems? (Select TWO). 

A. Backfire 

B. Dipole 

C. Omni 

D. PTZ 

E. Dish 

Answer: A,E 

Explanation: 

Q8. Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash? 

A. Input validation 

B. Exception handling 

C. Application hardening 

D. Fuzzing 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 

Q9. Joe, the security administrator, has determined that one of his web servers is under attack. Which of the following can help determine where the attack originated from? 

A. Capture system image 

B. Record time offset 

C. Screenshots 

D. Network sniffing 

Answer:

Explanation: 

Network sniffing is the process of capturing and analyzing the packets sent between systems on 

the network. A network sniffer is also known as a Protocol Analyzer. 

A Protocol Analyzer is a hardware device or more commonly a software program used to capture 

network data communications sent between devices on a network. Capturing and analyzing the 

packets sent to the web server will help determine the source IP address of the system sending 

the packets. 

Well known software protocol analyzers include Message Analyzer (formerly Network Monitor) 

from Microsoft and Wireshark (formerly Ethereal). 

Q10. HOTSPOT 

For each of the given items, select the appropriate authentication category from the dropdown choices. 

Instructions: When you have completed the simulation, please select the Done button to submit. 

Answer:  

Explanation: 

Something you are includes fingerprints, retina scans, or voice recognition. 

Something you have includes smart cards, token devices, or keys. 

Something you know includes a passwords, codes, PINs, combinations, or secret phrases. 

Somewhere you are includes a physical location s or logical addresses, such as domain name, an IP address, or a MAC address. 

Something you do includes your typing rhythm, a secret handshake, or a private knock. 

References: 

Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, p 285.