SY0-401 Latest Exam (May 2018)

[Free] 2018(May) EnsurePass Pass4sure CompTIA SY0-401 Dumps with VCE and PDF 831-840

May 2, 2018 : Ensure you pass the IT Exams
2018 May CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 831 – (Topic 4)

Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives?

  1. Degaussing

  2. Physical Destruction

  3. Lock up hard drives in a secure safe

  4. Wipe

Answer: B Explanation:

The physical description of hard drives is the only secure means of disposing hard drives. This can include incineration, an acid bath, and crushing.

Question No: 832 – (Topic 4)

Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks?

  1. Intrusion Detection System

  2. Flood Guard Protection

  3. Web Application Firewall

  4. URL Content Filter

Answer: C Explanation:

Cross-site scripting (XSS) is a form of malicious code-injection attack on a web server in which an attacker injects code into the content sent to website visitors. XSS can be mitigated by implementing patch management on the web server, using firewalls, and auditing for suspicious activity.

Question No: 833 – (Topic 4)

Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier environment?

  1. NoSQL databases are not vulnerable to XSRF attacks from the application server.

  2. NoSQL databases are not vulnerable to SQL injection attacks.

  3. NoSQL databases encrypt sensitive information by default.

  4. NoSQL databases perform faster than SQL databases on the same hardware.

Answer: B Explanation:

NoSQL is a nonrelational database and does not use SQL. It is therefore not vulnerable to SQL injection attacks but is vulnerable to similar injection-type attacks.

Question No: 834 – (Topic 4)

Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).

  1. Disable the USB root hub within the OS.

  2. Install anti-virus software on the USB drives.

  3. Disable USB within the workstations BIOS.

  4. Apply the concept of least privilege to USB devices.

  5. Run spyware detection against all workstations.

Answer: A,C Explanation:

A: The USB root hub can be disabled from within the operating system. C: USB can also be configured and disabled in the system BIOS.

Question No: 835 – (Topic 4)

Joe, a network security engineer, has visibility to network traffic through network monitoring tools.

However, he’s concerned that a disgruntled employee may be targeting a server containing the company’s financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion?

  1. HIDS

  2. HIPS

  3. NIPS

  4. NIDS

Answer: A Explanation:

A host-based IDS (HIDS) is an intrusion detection system that runs as a service on a host computer system. It is used to monitor the machine logs, system events, and application activity for signs of intrusion. It is useful for detecting attacks that originate outside the organization as well as attacks by internal users logged on to the system.

Question No: 836 – (Topic 4)

Which of the following techniques describes the use of application isolation during execution to prevent system compromise if the application is compromised?

  1. Least privilege

  2. Sandboxing

  3. Black box

  4. Application hardening

Answer: B Explanation:

Sandboxing is the process of isolating a system before installing new applications on it so as to restrict any potential malware that may be embedded in the new application from being able to cause harm to production systems.

Question No: 837 – (Topic 4)

Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mis-configurations or faults?

  1. VLAN

  2. Protocol security

  3. Port security

  4. VSAN

Answer: D Explanation:

A storage area network (SAN) is a secondary network that offers storage isolation by consolidating storage devices such as hard drives, drive arrays, optical jukeboxes, and tape libraries. Virtualization can be used to further enhance the security of a SAN by using switches to create a VSAN. These switches act as routers controlling and filtering traffic into and out of the VSAN while allowing unrestricted traffic within the VSAN.

Question No: 838 – (Topic 4)

A computer is suspected of being compromised by malware. The security analyst examines the computer and finds that a service called Telnet is running and connecting to an external website over port 443. This Telnet service was found by comparing the system’s services to the list of standard services on the company’s system image. This review process depends on:

  1. MAC filtering.

  2. System hardening.

  3. Rogue machine detection.

  4. Baselining.

Answer: D


Application baseline defines the level or standard of security that will be implemented and maintained for the application. It may include requirements of hardware components, operating system versions, patch levels, installed applications and their configurations, and available ports and services. Systems can be compared to the baseline to ensure that the required level of security is being maintained.

Question No: 839 – (Topic 4)

Each server on a subnet is configured to only allow SSH access from the administrator’s workstation. Which of the following BEST describes this implementation?

  1. Host-based firewalls

  2. Network firewalls

  3. Network proxy

  4. Host intrusion prevention

Answer: A Explanation:

A host-based firewall is installed on a client system and is used to protect the client system from the activities of the user as well as from communication from the network or Internet. These firewalls manage network traffic using filters to block certain ports and protocols while allowing others to pass through the system.

Question No: 840 – (Topic 4)

Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent?

  1. Buffer overflow

  2. Pop-up blockers

  3. Cross-site scripting

  4. Fuzzing

Answer: A Explanation:

Buffer overflow is an exploit at programming error, bugs and flaws. It occurs when an application is fed more input data than it is programmed to handle. This may cause the application to terminate or to write data beyond the end of the allocated space in memory. The termination of the application may cause the system to send the data with temporary access to privileged levels in the system, while overwriting can cause important data to be lost. Proper error and exception handling and input validation will help prevent Buffer overflow exploits.

100% Ensurepass Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Ensurepass Free Guaranteed!
SY0-401 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No