[Free] 2018(July) Dumps4cert CompTIA SY0-401 Dumps with VCE and PDF Download 851-860

By | July 17, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 851 – (Topic 4)

Which of the following techniques can be used to prevent the disclosure of system information resulting from arbitrary inputs when implemented properly?

  1. Fuzzing

  2. Patch management

  3. Error handling

  4. Strong passwords

Answer: C Explanation:

Exception handling is an aspect of secure coding. When errors occur, the system should revert back to a secure state. This must be coded into the system by the programmer, and should capture errors and exceptions so that they could be handled by the application.

Question No: 852 – (Topic 4)

Identifying a list of all approved software on a system is a step in which of the following practices?

  1. Passively testing security controls

  2. Application hardening

  3. Host software baselining

  4. Client-side targeting

Answer: C Explanation:

Application baseline defines the level or standard of security that will be implemented and maintained for the application. It may include requirements of hardware components, operating system versions, patch levels, installed applications and their configurations, and available ports and services. Systems can be compared to the baseline to ensure that the required level of security is being maintained.

Question No: 853 – (Topic 4)

An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement?

  1. Implement IIS hardening by restricting service accounts.

  2. Implement database hardening by applying vendor guidelines.

  3. Implement perimeter firewall rules to restrict access.

  4. Implement OS hardening by applying GPOs.

Answer: D

Explanation: Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing or disabling unnecessary functions and features, removing or disabling unnecessary user accounts, disabling unnecessary protocols and ports, and disabling unnecessary services. This can be implemented using the native security features of an operating system, such as Group Policy Objects (GPOs).

Question No: 854 – (Topic 4)

A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen?

  1. Application control

  2. Remote wiping

  3. GPS

  4. Screen-locks

Answer: B Explanation:

Remote wipe is the process of deleting data on a device in the event that the device is stolen. This is performed over remote connections such as the mobile phone service or the internet connection and helps ensure that sensitive data is not accessed by unauthorized people.

Question No: 855 – (Topic 4)

The BEST methods for a web developer to prevent the website application code from being vulnerable to cross-site request forgery (XSRF) are to: (Select TWO).

  1. Permit redirection to Internet-facing web URLs.

  2. Ensure all HTML tags are enclosed in angle brackets, e.g., “lt;” and “gt;”.

  3. Validate and filter input on the server side and client side.

  4. Use a web proxy to pass website requests between the user and the application.

  5. Restrict and sanitize use of special characters in input and URLs.

Answer: C,E Explanation:

XSRF or cross-site request forgery applies to web applications and is an attack that exploits the web application’s trust of a user who known or is supposed to have been authenticated. This is often accomplished without the user’s knowledge.

XSRF can be prevented by adding a randomization string (called a nonce) to each URL request and session establishment and checking the client HTTP request header referrer for spoofing.

Question No: 856 – (Topic 4)

A database administrator would like to start encrypting database exports stored on the SAN, but the storage administrator warns that this may drastically increase the amount of disk space used by the exports. Which of the following explains the reason for the increase in disk space usage?

  1. Deduplication is not compatible with encryption

  2. The exports are being stored on smaller SAS drives

  3. Encrypted files are much larger than unencrypted files

  4. The SAN already uses encryption at rest

Answer: C Explanation:

Encryption adds overhead to the data which results in and increase in file size. This overhead is attached to each file and could include the encryption/decryption key, data recovery files and data decryption field in file header. As a result, requires increased storage space.

Question No: 857 – (Topic 4)

A large corporation has data centers geographically distributed across multiple continents. The company needs to securely transfer large amounts of data between the data center. The data transfer can be accomplished physically or electronically, but must prevent eavesdropping while the data is on transit. Which of the following represents the BEST cryptographic solution?

  1. Driving a van full of Micro SD cards from data center to data center to transfer data

  2. Exchanging VPN keys between each data center via an SSL connection and transferring the data in the VPN

  3. Using a courier to deliver symmetric VPN keys to each data center and transferring data in the VPN

  4. Using PKI to encrypt each file and transferring them via an Internet based FTP or cloud server

Answer: B Explanation:

A virtual private network (VPN) is an encrypted communication tunnel that connects two systems over an untrusted network, such as the Internet. They provide security for both authentication and data transmission through a process called encapsulation.

Secure Sockets Layer (SSL) can be used to exchange the VPN keys securely. SSL is used to establish secure TCP communication between two machines by encrypting the


Question No: 858 – (Topic 4)

A security administrator wants to ensure that the message the administrator sends out to their Chief Financial Officer (CFO) does not get changed in route. Which of the following is the administrator MOST concerned with?

  1. Data confidentiality

  2. High availability

  3. Data integrity

  4. Business continuity

Answer: C Explanation:

Integrity is the process of ensuring that the information has not been altered during transmission. This can be accomplished by means of hashing.

Question No: 859 – (Topic 4)

Which of the following is a best practice for error and exception handling?

  1. Log detailed exception but display generic error message

  2. Display detailed exception but log generic error message

  3. Log and display detailed error and exception messages

  4. Do not log or display error or exception messages

Answer: A Explanation:

A detailed explanation of the error is not helpful for most end users but might provide information that is useful to a hacker. It is therefore better to display a simple but helpful message to the end user and log the detailed information to an access-restricted log file for the administrator and programmer who would need as much information as possible about the problem in order to rectify it.

Question No: 860 – (Topic 4)

Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety of servers before deployment to the production environment while utilizing a limited amount of hardware resources. Which of the following would provide the BEST environment for performing this testing?

  1. OS hardening

  2. Application control

  3. Virtualization

  4. Sandboxing

Answer: C Explanation:

Virtualization is used to host one or more operating systems in the memory of a single host computer and allows multiple operating systems to run simultaneously on the same hardware, reducing costs. Virtualization offers the flexibility of quickly and easily making backups of entire virtual systems, and quickly recovering the virtual system when errors occur. Furthermore, malicious code compromises of virtual systems rarely affect the host system, which allows for safer testing and experimentation.

Topic 5, Access Control and Identity Management

100% Dumps4cert Free Download!
Download Free Demo:SY0-401 Demo PDF
100% Dumps4cert Pass Guaranteed!
SY0-401 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.