We assure that you may also undoubtedly pass the true exam without virtually any difficulties. 100% passing promise is not hollow terms. However, in case you really dont find through the CompTIA true certification exam, no matter what? explanation, we offer you full money back from the paying fees. Absolutely no questions asked!

2021 Nov SY0-401 exam answers

Q281. An organization recently switched from a cloud-based email solution to an in-house email server. The firewall needs to be modified to allow for sending and receiving email. Which of the following ports should be open on the firewall to allow for email traffic? (Select THREE). 

A. TCP 22 

B. TCP 23 

C. TCP 25 

D. TCP 53 

E. TCP 110 

F. TCP 143 

G. TCP 445 

Answer: C,E,F 

Explanation: 


Q282. An organization's security policy states that users must authenticate using something you do. Which of the following would meet the objectives of the security policy? 

A. Fingerprint analysis 

B. Signature analysis 

C. Swipe a badge 

D. Password 

Answer:

Explanation: 


Q283. A security administrator wants to ensure that the message the administrator sends out to their Chief Financial Officer (CFO) does not get changed in route. Which of the following is the administrator MOST concerned with? 

A. Data confidentiality 

B. High availability 

C. Data integrity 

D. Business continuity 

Answer:

Explanation: 

Integrity is the process of ensuring that the information has not been altered during transmission. This can be accomplished by means of hashing. 


Q284. Pete, a security analyst, has been tasked with explaining the different types of malware to his colleagues. The two malware types that the group seems to be most interested in are botnets and viruses. Which of the following explains the difference between these two types of malware? 

A. Viruses are a subset of botnets which are used as part of SYN attacks. 

B. Botnets are a subset of malware which are used as part of DDoS attacks. 

C. Viruses are a class of malware which create hidden openings within an OS. 

D. Botnets are used within DR to ensure network uptime and viruses are not. 

Answer:

Explanation: 

A botnet is a collection of Internet-connected programs communicating with other similar programs in order to perform tasks. This can be as mundane as keeping control of an Internet Relay Chat (IRC) channel, or it could be used to send spam email or participate in distributed denial-of-service attacks. The word botnet is a combination of the words robot and network. The term is usually used with a negative or malicious connotation. Computers can be co-opted into a botnet when they execute malicious software. This can be accomplished by luring users into making a drive-by download, exploiting web browser vulnerabilities, or by tricking the user into running a Trojan horse program, which may come from an email attachment. This malware will typically install modules that allow the computer to be commanded and controlled by the botnet's operator. Many computer users are unaware that their computer is infected with bots. Depending on how it is written, a Trojan may then delete itself, or may remain present to update and maintain the modules. 


Q285. Company A submitted a bid on a contract to do work for Company B via email. Company B was insistent that the bid did not come from Company A. Which of the following would have assured that the bid was submitted by Company A? 

A. Steganography 

B. Hashing 

C. Encryption 

D. Digital Signatures 

Answer:

Explanation: 

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. The message is encrypted using the encryption system, and a second piece of information, the digital signature, is added to the message. 


Refresh SY0-401 exam fees:

Q286. Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network? 

A. Security logs 

B. Protocol analyzer 

C. Audit logs 

D. Honeypot 

Answer:

Explanation: 

A honeypot is a system whose purpose it is to be attacked. An administrator can watch and study 

the attack to research current attack methodologies. 

According to the Wepopedia.com, a Honeypot luring a hacker into a system has several main 

purposes: 

The administrator can watch the hacker exploit the vulnerabilities of the system, thereby learning 

where the system has weaknesses that need to be redesigned. 

The hacker can be caught and stopped while trying to obtain root access to the system. 

By studying the activities of hackers, designers can better create more secure systems that are 

potentially invulnerable to future hackers. 

There are two main types of honeypots: 

Production - A production honeypot is one used within an organization's environment to help 

mitigate risk. 

Research – A research honeypot add value to research in computer security by providing a platform to study the threat. 


Q287. Which of the following types of technologies is used by security and research personnel for identification and analysis of new security threats in a networked environment by using false data/hosts for information collection? 

A. Honeynet 

B. Vulnerability scanner 

C. Port scanner 

D. Protocol analyzer 

Answer:

Explanation: 


Q288. Which of the following techniques can be used to prevent the disclosure of system information resulting from arbitrary inputs when implemented properly? 

A. Fuzzing 

B. Patch management 

C. Error handling 

D. Strong passwords 

Answer:

Explanation: 

Exception handling is an aspect of secure coding. When errors occur, the system should revert back to a secure state. This must be coded into the system by the programmer, and should capture errors and exceptions so that they could be handled by the application. 


Q289. A supervisor in the human resources department has been given additional job duties in the accounting department. Part of their new duties will be to check the daily balance sheet calculations on spreadsheets that are restricted to the accounting group. In which of the following ways should the account be handled? 

A. The supervisor should be allowed to have access to the spreadsheet files, and their membership in the human resources group should be terminated. 

B. The supervisor should be removed from the human resources group and added to the accounting group. 

C. The supervisor should be added to the accounting group while maintaining their membership in the human resources group. 

D. The supervisor should only maintain membership in the human resources group. 

Answer:

Explanation: 

You can assign permissions to access resources either to a user or a group. The most efficient way is to assign permissions to a group (group based privileges). By assigning the human resources supervisor’s user account to the group means the supervisor will inherit the permissions of that group, and allow him to carry out the new duties. Because the new duties are being added to his normal duties, maintaining membership in the human resources group will allow the supervisor to continue performing his normal duties. 


Q290. Joe, a user, in a coffee shop is checking his email over a wireless network. An attacker records the temporary credentials being passed to Joe’s browser. The attacker later uses the credentials to impersonate Joe and creates SPAM messages. Which of the following attacks allows for this impersonation? 

A. XML injection 

B. Directory traversal 

C. Header manipulation 

D. Session hijacking 

Answer:

Explanation: 

In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer.