Skip to content

All About Simulation SY0-401 dumps

Exam Code: sy0 401 practice exam (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Security+ Certification
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass comptia sy0 401 Exam.


Free VCE & PDF File for CompTIA SY0-401 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on:

Q141. Jane, an IT security technician, needs to create a way to secure company mobile devices. Which of the following BEST meets this need? 

A. Implement voice encryption, pop-up blockers, and host-based firewalls. 

B. Implement firewalls, network access control, and strong passwords. 

C. Implement screen locks, device encryption, and remote wipe capabilities. 

D. Implement application patch management, antivirus, and locking cabinets. 


Explanation: Screen-lock is a security feature that requires the user to enter a password after a short period of inactivity before they can access the system again. This feature ensures that if your device is left unattended or is lost or stolen, it will be difficult for anyone else to access your data or applications. Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. Remote wipe is the process of deleting data on a device in the event that the device is stolen. This is performed over remote connections such as the mobile phone service or the internet connection and helps ensure that sensitive data is not accessed by unauthorized people. 

Q142. The security team would like to gather intelligence about the types of attacks being launched against the organization. Which of the following would provide them with the MOST information? 

A. Implement a honeynet 

B. Perform a penetration test 

C. Examine firewall logs 

D. Deploy an IDS 



A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. The Honeynet Project, a non-profit research organization dedicated to computer security and information sharing, actively promotes the deployment of honeynets. In addition to the honey pots, a honeynet usually has real applications and services so that it seems like a normal network and a worthwhile target. However, because the honeynet doesn't actually serve any authorized users, any attempt to contact the network from without is likely an illicit attempt to breach its security, and any outbound activity is likely evidence that a system has been compromised. For this reason, the suspect information is much more apparent than it would be in an actual network, where it would have to be found amidst all the legitimate network data. Applications within a honeynet are often given names such as "Finances" or "Human Services" to make them sound appealing to the attacker. 

A virtual honeynet is one that, while appearing to be an entire network, resides on a single server. 

Q143. Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on employees' computers? 

A. Least privilege accounts 

B. Host-based firewalls 

C. Intrusion Detection Systems 

D. Application white listing 



Q144. While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing? 







WEP is one of the more vulnerable security protocols. The only time to use WEP is when you must have compatibility with older devices that do not support new encryption. 

Q145. Three of the primary security control types that can be implemented are. 

A. Supervisory, subordinate, and peer. 

B. Personal, procedural, and legal. 

C. Operational, technical, and management. 

D. Mandatory, discretionary, and permanent. 



The National Institute of Standards and Technology (NIST) places controls into various types. The control types fall into three categories: Management, Operational, and Technical. 

Q146. Which of the following devices is used for the transparent security inspection of network traffic by redirecting user packets prior to sending the packets to the intended destination? 

A. Proxies 

B. Load balancers 

C. Protocol analyzer 

D. VPN concentrator 



Q147. Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company data. Where and how should Matt meet this requirement? 

A. Matt should implement access control lists and turn on EFS. 

B. Matt should implement DLP and encrypt the company database. 

C. Matt should install Truecrypt and encrypt the company server. 

D. Matt should install TPMs and encrypt the company database. 



Data loss prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed. They also monitor who is using the data (looking for unauthorized access) and transmitting the data. Encryption is used to protect data. 

Q148. A recent review of accounts on various systems has found that after employees' passwords are required to change they are recycling the same password as before. Which of the following policies should be enforced to prevent this from happening? (Select TWO). 

A. Reverse encryption 

B. Minimum password age 

C. Password complexity 

D. Account lockouts 

E. Password history 

F. Password expiration 

Answer: B,E 


Q149. An organization must implement controls to protect the confidentiality of its most sensitive data. The company is currently using a central storage system and group based access control for its sensitive information. Which of the following controls can further secure the data in the central storage system? 

A. Data encryption 

B. Patching the system 

C. Digital signatures 

D. File hashing 



Q150. Users have been reporting that their wireless access point is not functioning. They state that it allows slow connections to the internet, but does not provide access to the internal network. The user provides the SSID and the technician logs into the company’s access point and finds no issues. Which of the following should the technician do? 

A. Change the access point from WPA2 to WEP to determine if the encryption is too strong 

B. Clear all access logs from the AP to provide an up-to-date access list of connected users 

C. Check the MAC address of the AP to which the users are connecting to determine if it is an imposter 

D. Reconfigure the access point so that it is blocking all inbound and outbound traffic as a troubleshooting gap 



The users may be connecting to a rogue access point. The rogue access point could be hosting a wireless network that has the same SSID as the corporate wireless network. The only way to tell for sure if the access point the users are connecting to is the correct one is to check the MAC address. Every network card has a unique 48-bit address assigned. A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi. Logically, MAC addresses are used in the media access control protocol sublayer of the OSI reference model. MAC addresses are most often assigned by the manufacturer of a network interface controller (NIC) and are stored in its hardware, such as the card's read-only memory or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address (BIA). It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. This can be contrasted to a programmed address, where the host device issues commands to the NIC to use an arbitrary address. A network node may have multiple NICs and each NIC must have a unique MAC address. MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64.