Do not bother with hunting for CompTIA SY0-401 Exam preparation material on different websites and training manuals. Use our CompTIA Security+ SY0-401 Exam Dumps material for a step-by-step approach to learning and tackle easy–to-difficult SY0-401 exam questions in a systematic manner. Our experts have enumerated all possible SY0-401 exam questions with answers which you may encounter during the CompTIA Security+ SY0-401certification exam.
♥♥ 2018 NEW RECOMMEND SY0-401 Exam Questions ♥♥
SY0-401 exam questions, SY0-401 PDF dumps; SY0-401 exam dumps:: https://www.dumpsschool.com/SY0-401-exam-dumps.html (1781 Q&A) (New Questions Are 100% Available! Also Free Practice Test Software!)
Latest and Most Accurate CompTIA SY0-401 Dumps Exam Questions and Answers:
A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HTTP/1.1 403 Forbidden
Log: Access denied with 403. Pattern matches form bypass Which of the following technologies was MOST likely being used to generate this log?
A. Host-based Intrusion Detection System
B. Web application firewall
C. Network-based Intrusion Detection System
D. Stateful Inspection Firewall
E. URL Content Filter
A web application firewall is a device, server add-on, virtual service, or system filter that defines a strict set of communication rules for a website and all visitors. It’s intended to be an application-specific firewall to prevent cross-site scripting, SQL injection, and other web application attacks.
A: A host-based IDS (HIDS) watches the audit trails and log fi les of a host system. It’s reliable for detecting attacks directed against a host, whether they originate from an external source or are being perpetrated by a user locally logged in to the host.
C: NIDS is reliable for detecting attacks directed against a host, whether they originate from an external source or are being perpetrated by a user locally logged in to the host.
D: A stateful inspection firewall is aware that any valid outbound communication will trigger a corresponding response or reply from the external entity.
E: URL filtering involves blocking websites (or sections of websites) based solely on the URL, restricting access to specified websites and certain web-based applications.
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 6, 19, 20, 21
An administrator would like to review the effectiveness of existing security in the enterprise. Which of the following would be the BEST place to start?
A. Review past security incidents and their resolution
B. Rewrite the existing security policy
C. Implement an intrusion prevention system
D. Install honey pot systems
The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it
A: If the incidents have been resolved, the system would be configured to deal with those incidents. It is the new incidents that are the issue.
B: Rewriting the security policy could be a step further down the line, after requirements have been determined.
D: A honeypot is a system whose purpose it is to be attacked. An administrator can watch and study the attack to research current attack methodologies.
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, p. 213
The security administrator at ABC company received the following log information from an external party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 18.104.22.168:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 22.214.171.124:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 126.96.36.199:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company’s security administrator is unable to determine the origin of the attack?
A. A NIDS was used in place of a NIPS.
B. The log is not in UTC.
C. The external party uses a firewall.
D. ABC company uses PAT.
PAT would ensure that computers on ABC’s LAN translate to the same IP address, but with a different port number assignment. The log information shows the IP address, not the port number, making it impossible to pin point the exact source.
A: A network-based IDS (NIDS) watches network traffic in real time. It’s reliable for detecting network-focused attacks, such as bandwidth-based DoS attacks. This will not have any bearing on the security administrator at ABC Company finding the root of the attack.
B: UTC is the abbreviation for Coordinated Universal Time, which is the primary time standard by which the world regulates clocks and time. The time in the log is not the issue in this case.
C: Whether the external party uses a firewall or not will not have any bearing on the security administrator at ABC Company finding the root of the attack.
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?
Ip tables are a user-space application program that allows a system administrator to configure the tables provided by the Linux kernel firewall and the chains and rules it stores.
A: A sniffer is a tool used in the process of monitoring the data that is transmitted across a network.
B, D: A router is connected to two or more data lines from different networks, whereas a network switch is connected to data lines from one single network. These may include a firewall, but not by default.
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis, 2014, p. 342
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
A. Packet Filter Firewall
B. Stateful Firewall
C. Proxy Firewall
D. Application Firewall
Stateful inspections occur at all levels of the network.
A: Packet-filtering firewalls operate at the Network layer (Layer 3) and the Transport layer (Layer 4) of the Open Systems Interconnect (OSI) model.
C: The proxy function can occur at either the application level or the circuit level.
D: Application Firewalls operates at the Application layer (Layer7) of the OSI model.
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis, 2014, pp. 98-100
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, p. 6
The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO’s requirements?
D. Web proxies
E. Layer 2 switches
New Updated SY0-401 Exam Questions SY0-401 PDF dumps SY0-401 practice exam dumps: https://www.dumpsschool.com/SY0-401-exam-dumps.html