Download of comptia security+ get certified get ahead sy0 401 study guide book materials and resource for CompTIA certification for IT specialist, Real Success Guaranteed with Updated sy0 401 dump pdf dumps vce Materials. 100% PASS CompTIA Security+ Certification exam Today!

Q341. Joe must send Ann a message and provide Ann with assurance that he was the actual sender. Which of the following will Joe need to use to BEST accomplish the objective? 

A. A pre-shared private key 

B. His private key 

C. Ann's public key 

D. His public key 

Answer:

Explanation: 


Q342. A security administrator examines a network session to a compromised database server with a packet analyzer. Within the session there is a repeated series of the hex character 90 (x90). 

Which of the following attack types has occurred? 

A. Buffer overflow 

B. Cross-site scripting 

C. XML injection 

D. SQL injection 

Answer:

Explanation: Explanation The hex character 90 (x90) means NOP or No Op or No Operation. In a buffer overflow attack, the buffer can be filled and overflowed with No Op commands. A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability. 


Q343. Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic? 

A. Connect the WAP to a different switch. 

B. Create a voice VLAN. 

C. Create a DMZ. 

D. Set the switch ports to 802.1q mode. 

Answer:

Explanation: 

It is a common and recommended practice to separate voice and data traffic by using VLANs. Separating voice and data traffic using VLANs provides a solid security boundary, preventing data applications from reaching the voice traffic. It also gives you a simpler method to deploy QoS, prioritizing the voice traffic over the data. 


Q344. A computer supply company is located in a building with three wireless networks. The system security team implemented a quarterly security scan and saw the following. 

SSIDStateChannelLevel 

Computer AreUs1connected170dbm 

Computer AreUs2connected580dbm 

Computer AreUs3connected375dbm 

Computer AreUs4connected695dbm 

Which of the following is this an example of? 

A. Rogue access point 

B. Near field communication 

C. Jamming 

D. Packet sniffing 

Answer:

Explanation: 

The question states that the building has three wireless networks. However, the scan is showing four wireless networks with the SSIDs: Computer AreUs1 , Computer AreUs2 , Computer AreUs3 and Computer AreUs4. Therefore, one of these wireless networks probably shouldn’t be there. This is an example of a rogue access point. A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security threat to large organizations with many employees, because anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network to unauthorized parties. Rogue access points of the second kind target networks that do not employ mutual authentication (client-server server-client) and may be used in conjunction with a rogue RADIUS server, depending on security configuration of the target network. To prevent the installation of rogue access points, organizations can install wireless intrusion prevention systems to monitor the radio spectrum for unauthorized access points. 


Q345. A network administrator has purchased two devices that will act as failovers for each other. Which of the following concepts does this BEST illustrate? 

A. Authentication 

B. Integrity 

C. Confidentiality 

D. Availability 

Answer:

Explanation: 

Failover refers to the process of reconstructing a system or switching over to other systems when a failure is detected. In the case of a server, the server switches to a redundant server when a fault is detected. This strategy allows service to continue uninterrupted until the primary server can be restored. In the case of a network, this means processing switches to another network path in the event of a network failure in the primary path. This means availability. 


Q346. To ensure compatibility with their flagship product, the security engineer is tasked to recommend an encryption cipher that will be compatible with the majority of third party software and hardware vendors. Which of the following should be recommended? 

A. SHA 

B. MD5 

C. Blowfish 

D. AES 

Answer:

Explanation: 

Explanation: AES (Advanced Encryption Standard) has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES) which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. AES is used to encrypt data, not to verify data integrity. 


Q347. Ann works at a small company and she is concerned that there is no oversight in the finance department; specifically, that Joe writes, signs and distributes paycheques, as well as other expenditures. Which of the following controls can she implement to address this concern? 

A. Mandatory vacations 

B. Time of day restrictions 

C. Least privilege 

D. Separation of duties 

Answer:

Explanation: 

Separation of duties divides administrator or privileged tasks into separate groupings, which in turn, is individually assigned to unique administrators. This helps in fraud prevention, error reduction, as well as conflict of interest prevention. For example, those who configure security should not be the same people who test security. In this case, Joe should not be allowed to write and sign paycheques. 


Q348. Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE). 

A. Spam filter 

B. Load balancer 

C. Antivirus 

D. Proxies 

E. Firewall 

F. NIDS 

G. URL filtering 

Answer: D,E,G 

Explanation: 

A proxy server is a server that acts as an intermediary for requests from clients seeking resources 

from other servers. 

Firewalls manage traffic using a rule or a set of rules. 

A URL is a reference to a resource that specifies the location of the resource. A URL filter is used 

to block access to a site based on all or part of a URL. 


Q349. Which of the following controls would prevent an employee from emailing unencrypted information to their personal email account over the corporate network? 

A. DLP 

B. CRL 

C. TPM 

D. HSM 

Answer:

Explanation: 

Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data. 


Q350. Which of the following is a common coding error in which boundary checking is not performed? 

A. Input validation 

B. Fuzzing 

C. Secure coding 

D. Cross-site scripting 

Answer:

Explanation: 

Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain.