CompTIA SY0-401 Exam Questions Newly Updated By Braindump2go (71-80)

COMPTIA NEWS: SY0-401 Exam Questions has been Updated Today! Get Latest SY0-401 VCE and SY0-401 PDF Instantly! Welcome to Download the Newest Braindump2go SY0-401 VCE&SY0-401 PDF Dumps: (1220 Q&As)

All Latest Updated Questions and Answers in Braindump2go SY0-401 Exam Dumps will not take you a lot of time to comprehend and you can easily cover up the entire CompTIA SY0-401 syllabus for your examination.Download Braindump2go Free SY0-401 Sample Questions Now, Pass SY0-401 Exam in advance!

Exam Code: SY0-401
Exam Name: CompTIA Security+
Certification Provider: CompTIA
Corresponding Certification: CompTIA Security+

SY0-401 Dump,SY0-401 PDF,SY0-401 VCE,SY0-401 Braindump,SY0-401 Study Guide,SY0-401 Study Guide PDF,SY0-401 Objectives,SY0-401 Practice Test,SY0-401 Practice Exam,SY0-401 Performance Based Questions,SY0-401 Exam Questions,SY0-401 Exam Dumps,SY0-401 Exam PDF,SY0-401 Dumps Free,SY0-401 Dumps PDF

A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal?

A.    Block port 23 on the L2 switch at each remote site
B.    Block port 23 on the network firewall
C.    Block port 25 on the L2 switch at each remote site
D.    Block port 25 on the network firewall

Answer: B
Telnet is a terminal-emulation network application that supports remote connectivity for executing commands and running applications but doesn’t support transfer of fi les. Telnet uses TCP port 23. Because it’s a clear text protocol and service, it should be avoided and replaced with SSH.

A security analyst noticed a colleague typing the following command:
`Telnet some-host 443′
Which of the following was the colleague performing?

A.    A hacking attempt to the some-host web server with the purpose of achieving a distributed denial of service attack.
B.    A quick test to see if there is a service running on some-host TCP/443, which is being routed correctly and not blocked by a firewall.
C.    Trying to establish an insecure remote management session. The colleague should be using SSH or terminal services instead.
D.    A mistaken port being entered because telnet servers typically do not listen on port 443.

Answer: B
B: The Telnet program parameters are: telnet <hostname> <port> <hostname> is the name or IP address of the remote server to connect to. <port> is the port number of the service to use for the connection. TCP port 443 provides the HTTPS (used for secure web connections) service; it is the default SSL port. By running the Telnet some-host 443 command, the security analyst is checking that routing is done properly and not blocked by a firewall.

Which of the following secure file transfer methods uses port 22 by default?

A.    FTPS
B.    SFTP
C.    SSL
D.    S/MIME

Answer: B
SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22.

Which of the following BEST describes the weakness in WEP encryption?

A.    The initialization vector of WEP uses a crack-able RC4 encryption algorithm.
Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived.
B.    The WEP key is stored in plain text and split in portions across 224 packets of random data.
Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key.
C.    The WEP key has a weak MD4 hashing algorithm used.
A simple rainbow table can be used to generate key possibilities due to MD4 collisions.
D.    The WEP key is stored with a very small pool of random numbers to make the cipher text.
As the random numbers are often reused it becomes easy to derive the remaining WEP key.

Answer: D
WEP is based on RC4, but due to errors in design and implementation, WEP is weak in a number of areas, two of which are the use of a static common key and poor implementation of initiation vectors (IVs). When the WEP key is discovered, the attacker can join the network and then listen in on all other wireless client communications.

Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords?

A.    EAP-MD5
B.    WEP

Answer: C
PEAP-MS-CHAP v2 is easier to deploy than EAP-TLS or PEAP-TLS because user authentication is accomplished via password-base credentials (user name and password) rather than digital certificates or smart cards.

Matt, a systems security engineer, is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credential type authentication method BEST fits these requirements?


Answer: D
PEAP-MS-CHAP v2 is easier to deploy than EAP-TLS or PEAP-TLS because user authentication is accomplished via password-base credentials (user name and password) rather than digital certificates or smart cards. Only servers running Network Policy Server (NPS) or PEAP-MS-CHAP v2 are required to have a certificate.

Which of the following means of wireless authentication is easily vulnerable to spoofing?

A.    MAC Filtering
B.    WPA – LEAP
C.    WPA – PEAP
D.    Enabled SSID

Answer: A
Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can easily change, or “spoof,” MAC addresses in software.
Networks can use MAC address filtering, only allowing devices with specific MAC addresses to connect to a network. This isn’t a great security tool because people can spoof their MAC addresses.

Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her office without supplying a username/password combination. Upon disconnecting from the wireless network, she attempted to connect her personal tablet computer to the same wireless network and could not connect.
Which of the following is MOST likely the reason?

A.    The company wireless is using a MAC filter.
B.    The company wireless has SSID broadcast disabled.
C.    The company wireless is using WEP.
D.    The company wireless is using WPA2.

Answer: A
MAC filtering allows you to include or exclude computers and devices based on their MAC address.

After entering the following information into a SOHO wireless router, a mobile device’s user reports being unable to connect to the network:
PERMIT 0A: D1: FA. B1: 03: 37
DENY 01: 33: 7F: AB: 10: AB
Which of the following is preventing the device from connecting?

A.    WPA2-PSK requires a supplicant on the mobile device.
B.    Hardware address filtering is blocking the device.
C.    TCP/IP Port filtering has been implemented on the SOHO router.
D.    IP address filtering has disabled the device from connecting.

Answer: B
MAC filtering allows you to include or exclude computers and devices based on their MAC address.

A security analyst has been tasked with securing a guest wireless network. They recommend the company use an authentication server but are told the funds are not available to set this up.
Which of the following BEST allows the analyst to restrict user access to approved devices?

A.    Antenna placement
B.    Power level adjustment
C.    Disable SSID broadcasting
D.    MAC filtering

Answer: D
A MAC filter is a list of authorized wireless client interface MAC addresses that is used by a WAP to block access to all unauthorized devices.

Braindump2go is one of the Leading SY0-401 Exam Preparation Material Providers Around the World! We Offer 100% Money Back Guarantee on All Products! Feel Free In Downloading Our New Released SY0-401 Real Exam Questions!

FREE DOWNLOAD: NEW UPDATED SY0-401 PDF Dumps & SY0-401 VCE Dumps from Braindump2go: (1220 Q&A)

Comments are closed.