Exam Code: SY0-401 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Security+ Certification
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass SY0-401 Exam.

2021 Dec SY0-401 practice test

Q201. DRAG DROP 

A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them. 

Answer: 

Explanation: 

When dealing with multiple issues, address them in order of volatility (OOV); always deal with the most volatile first. Volatility can be thought of as the amount of time that you have to collect certain data before a window of opportunity is gone. Naturally, in an investigation you want to collect everything, but some data will exist longer than others, and you cannot possibly collect all of it once. As an example, the OOV in an investigation may be RAM, hard drive data, CDs/DVDs, and printouts. 

Order of volatility: Capture system images as a snapshot of what exists, look at network traffic and logs, capture any relevant video/screenshots/hashes, record time offset on the systems, talk to witnesses, and track total man-hours and expenses associated with the investigation. 

References: 

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, 

Indianapolis, 2014, p 453 


Q202. Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems? 

A. Incident management 

B. Server clustering 

C. Change management 

D. Forensic analysis 

Answer:

Explanation: 

Change Management is a risk mitigation approach and refers to the structured approach that is followed to secure a company’s assets. In this case ‘performing updates to business critical systems. 


Q203. An administrator was asked to review user accounts. Which of the following has the potential to cause the MOST amount of damage if the account was compromised? 

A. A password that has not changed in 180 days 

B. A single account shared by multiple users 

C. A user account with administrative rights 

D. An account that has not been logged into since creation 

Answer:

Explanation: 


Q204. Which of the following technologies can store multi-tenant data with different security requirements? 

A. Data loss prevention 

B. Trusted platform module 

C. Hard drive encryption 

D. Cloud computing 

Answer:

Explanation: 

One of the ways cloud computing is able to obtain cost efficiencies is by putting data from various clients on the same machines. This “multitenant” nature means that workloads from different clients can be on the same system, and a flaw in implementation could compromise security. 


Q205. Jane has implemented an array of four servers to accomplish one specific task. This is BEST known as which of the following? 

A. Clustering 

B. RAID 

C. Load balancing 

D. Virtualization 

Answer:

Explanation: 

Anytime you connect multiple computers to work/act together as a single server, it is known as clustering. Clustered systems utilize parallel processing (improving performance and availability) and add redundancy (but also add costs). 


Replace SY0-401 practice test:

Q206. Which of the following is the BEST reason for placing a password lock on a mobile device? 

A. Prevents an unauthorized user from accessing owner's data 

B. Enables remote wipe capabilities 

C. Stops an unauthorized user from using the device again 

D. Prevents an unauthorized user from making phone calls 

Answer:

Explanation: 


Q207. Failure to validate the size of a variable before writing it to memory could result in which of the following application attacks? 

A. Malicious logic 

B. Cross-site scripting 

C. SQL injection 

D. Buffer overflow 

Answer:

Explanation: 


Q208. An application developer has tested some of the known exploits within a new application. Which of the following should the administrator utilize to test for unidentified faults or memory leaks? 

A. XSRF Attacks 

B. Fuzzing 

C. Input Validations 

D. SQL Injections 

Answer:

Explanation: 


Q209. Ann is an employee in the accounting department and would like to work on files from her home computer. She recently heard about a new personal cloud storage service with an easy web interface. Before uploading her work related files into the cloud for access, which of the following is the MOST important security concern Ann should be aware of? 

A. Size of the files 

B. Availability of the files 

C. Accessibility of the files from her mobile device 

D. Sensitivity of the files 

Answer:

Explanation: 


Q210. Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture on a popular social media site together with the message: "Heading to our two weeks vacation to Italy." Upon returning home, Joe discovers that the house was burglarized. Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe’s home address? 

A. Joe has enabled the device access control feature on his mobile phone. 

B. Joe’s home address can be easily found using the TRACEROUTE command. 

C. The picture uploaded to the social media site was geo-tagged by the mobile phone. 

D. The message posted on the social media site informs everyone the house will be empty. 

Answer:

Explanation: 

Geo-tagging is the process of embedding the GPS coordinates in image files and images taken using a smartphone or a digital camera. The geotagged information accompanying the image allows anyone to discover the precise location where the image was taken.