CompTIA SY0-401 : Practice Test
Question No : 1
An achievement in providing worldwide Internet security was the signing of certificates
associated with which of the following protocols?
B.SSL
Answer: C
Question No : 2
A Chief Information Security Officer (CISO) wants to implement two-factor authentication
within the company. Which of the following would fulfill the CISO’s requirements?
C.USB token and PIN
Answer: C
Question No : 3
Which of the following can a security administrator implement on mobile devices that will
help prevent unwanted people from viewing the data if the device is left unattended?
a.Screen lock
Answer: A
Question No : 4
Which of the following would a security administrator implement in order to identify a
problem between two systems that are not communicating properly?
A.Protocol analyzer
Answer: A
Question No : 5
Which of the following can result in significant administrative overhead from incorrect
reporting?
C.False positives
Answer: C
Question No : 6
A security administrator wants to perform routine tests on the network during working
hours when certain applications are being accessed by the most people. Which of the
following would allow the security administrator to test the lack of security controls for
those applications with the least impact to the system?
B.Vulnerability scan
Answer: B
Question No : 7
Which of the following risk concepts requires an organization to determine the number of
failures per year?
B.ALE
Answer: B
, CompTIA SY0-401 : Practice Test
Question No : 8
Please be aware that if you do not accept these terms you will not be allowed to take this
CompTIA exam and you will forfeit the fee paid.
A.RETURN TO EXAM
Answer: A
Question No : 9
Three of the primary security control types that can be implemented are.
C.operational, technical, and management.
Answer: C
Question No : 10
The helpdesk reports increased calls from clients reporting spikes in malware infections on
their systems. Which of the following phases of incident response is MOST appropriate as
a FIRST response?
D.Identification
Answer: D
Question No : 11
Which of the following protocols operates at the HIGHEST level of the OSI model?
d.SCP
Answer: C
Question No : 12
Joe, the system administrator, has been asked to calculate the Annual Loss Expectancy
(ALE) for a $5,000 server, which often crashes. In the past year, the server has crashed 10
times, requiring a system reboot to recover with only 10% loss of data or function. Which of
the following is the ALE of this server?
b.$5,000
Answer: B
Question No : 13
Which of the following should an administrator implement to research current attack
methodologies?
b.Honeypot
Answer: B
Question No : 14
Which of the following can be implemented in hardware or software to protect a web server
from cross-site scripting attacks?
c.Web Application Firewall
Answer: C
, CompTIA SY0-401 : Practice Test
Question No : 15
Which of the following means of wireless authentication is easily vulnerable to spoofing?
a.MAC Filtering
Answer: A
Question No : 16
The BEST methods for a web developer to prevent the website application code from
being vulnerable to cross-site request forgery (XSRF) are to: (Select TWO).
c.validate and filter input on the server side and client side.
e.restrict and sanitize use of special characters in input and URLs.
Answer: C,E
Question No : 17
Jane, a security administrator, needs to implement a secure wireless authentication
method that uses a remote RADIUS server for authentication. Which of the following is an
authentication method Jane should use?
d.LEAP
Answer: D
Question No : 18
Computer evidence at a crime scene is documented with a tag stating who had possession
of the evidence at a given time. Which of the following does this illustrate?
d.Chain of custody
Answer: D
Question No : 19
A network administrator is configuring access control for the sales department which has
high employee turnover. Which of the following is BEST suited when assigning user rights
to individuals in the sales department?
b.Group based privileges
Answer: B
Question No : 20
Which of the following is being tested when a company’s payroll server is powered off for
eight hours?
c.Continuity of operations plan
Answer: C
Question No : 21
A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit
has been created for a frequently used application. She notifies the software vendor and
asks them for remediation steps, but is alarmed to find that no patches are available to
mitigate this vulnerability.
Which of the following BEST describes this exploit?
b.Zero-day
Answer: B
, CompTIA SY0-401 : Practice Test
Question No : 22
A security administrator has concerns about new types of media which allow for the mass
distribution of personal comments to a select group of people. To mitigate the risks
involved with this media, employees should receive training on which of the following?
c.Social networking
Answer: C
Question No : 23
A network administrator is responsible for securing applications against external attacks.
Every month, the underlying operating system is updated. There is no process in place for
other software updates.
Which of the following processes could MOST effectively mitigate these risks?
C.Application patch management
Answer: C
Question No : 24
A software developer is responsible for writing the code on an accounting application.
Another software developer is responsible for developing code on a system in human
resources. Once a year they have to switch roles for several weeks.
Which of the following practices is being implemented?
b.Job rotation
Answer: B
Question No : 25
A network engineer is designing a secure tunneled VPN. Which of the following protocols
would be the MOST secure?
b.IPsec
Answer: A
Question No : 26
Which of the following implementation steps would be appropriate for a public wireless
hotspot?
c.Open system authentication
Answer: C
Question No : 27
Which of the following is a step in deploying a WPA2-Enterprise wireless network?
d.Install a digital certificate on the authentication server
Answer: D
Question No : 1
An achievement in providing worldwide Internet security was the signing of certificates
associated with which of the following protocols?
B.SSL
Answer: C
Question No : 2
A Chief Information Security Officer (CISO) wants to implement two-factor authentication
within the company. Which of the following would fulfill the CISO’s requirements?
C.USB token and PIN
Answer: C
Question No : 3
Which of the following can a security administrator implement on mobile devices that will
help prevent unwanted people from viewing the data if the device is left unattended?
a.Screen lock
Answer: A
Question No : 4
Which of the following would a security administrator implement in order to identify a
problem between two systems that are not communicating properly?
A.Protocol analyzer
Answer: A
Question No : 5
Which of the following can result in significant administrative overhead from incorrect
reporting?
C.False positives
Answer: C
Question No : 6
A security administrator wants to perform routine tests on the network during working
hours when certain applications are being accessed by the most people. Which of the
following would allow the security administrator to test the lack of security controls for
those applications with the least impact to the system?
B.Vulnerability scan
Answer: B
Question No : 7
Which of the following risk concepts requires an organization to determine the number of
failures per year?
B.ALE
Answer: B
, CompTIA SY0-401 : Practice Test
Question No : 8
Please be aware that if you do not accept these terms you will not be allowed to take this
CompTIA exam and you will forfeit the fee paid.
A.RETURN TO EXAM
Answer: A
Question No : 9
Three of the primary security control types that can be implemented are.
C.operational, technical, and management.
Answer: C
Question No : 10
The helpdesk reports increased calls from clients reporting spikes in malware infections on
their systems. Which of the following phases of incident response is MOST appropriate as
a FIRST response?
D.Identification
Answer: D
Question No : 11
Which of the following protocols operates at the HIGHEST level of the OSI model?
d.SCP
Answer: C
Question No : 12
Joe, the system administrator, has been asked to calculate the Annual Loss Expectancy
(ALE) for a $5,000 server, which often crashes. In the past year, the server has crashed 10
times, requiring a system reboot to recover with only 10% loss of data or function. Which of
the following is the ALE of this server?
b.$5,000
Answer: B
Question No : 13
Which of the following should an administrator implement to research current attack
methodologies?
b.Honeypot
Answer: B
Question No : 14
Which of the following can be implemented in hardware or software to protect a web server
from cross-site scripting attacks?
c.Web Application Firewall
Answer: C
, CompTIA SY0-401 : Practice Test
Question No : 15
Which of the following means of wireless authentication is easily vulnerable to spoofing?
a.MAC Filtering
Answer: A
Question No : 16
The BEST methods for a web developer to prevent the website application code from
being vulnerable to cross-site request forgery (XSRF) are to: (Select TWO).
c.validate and filter input on the server side and client side.
e.restrict and sanitize use of special characters in input and URLs.
Answer: C,E
Question No : 17
Jane, a security administrator, needs to implement a secure wireless authentication
method that uses a remote RADIUS server for authentication. Which of the following is an
authentication method Jane should use?
d.LEAP
Answer: D
Question No : 18
Computer evidence at a crime scene is documented with a tag stating who had possession
of the evidence at a given time. Which of the following does this illustrate?
d.Chain of custody
Answer: D
Question No : 19
A network administrator is configuring access control for the sales department which has
high employee turnover. Which of the following is BEST suited when assigning user rights
to individuals in the sales department?
b.Group based privileges
Answer: B
Question No : 20
Which of the following is being tested when a company’s payroll server is powered off for
eight hours?
c.Continuity of operations plan
Answer: C
Question No : 21
A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit
has been created for a frequently used application. She notifies the software vendor and
asks them for remediation steps, but is alarmed to find that no patches are available to
mitigate this vulnerability.
Which of the following BEST describes this exploit?
b.Zero-day
Answer: B
, CompTIA SY0-401 : Practice Test
Question No : 22
A security administrator has concerns about new types of media which allow for the mass
distribution of personal comments to a select group of people. To mitigate the risks
involved with this media, employees should receive training on which of the following?
c.Social networking
Answer: C
Question No : 23
A network administrator is responsible for securing applications against external attacks.
Every month, the underlying operating system is updated. There is no process in place for
other software updates.
Which of the following processes could MOST effectively mitigate these risks?
C.Application patch management
Answer: C
Question No : 24
A software developer is responsible for writing the code on an accounting application.
Another software developer is responsible for developing code on a system in human
resources. Once a year they have to switch roles for several weeks.
Which of the following practices is being implemented?
b.Job rotation
Answer: B
Question No : 25
A network engineer is designing a secure tunneled VPN. Which of the following protocols
would be the MOST secure?
b.IPsec
Answer: A
Question No : 26
Which of the following implementation steps would be appropriate for a public wireless
hotspot?
c.Open system authentication
Answer: C
Question No : 27
Which of the following is a step in deploying a WPA2-Enterprise wireless network?
d.Install a digital certificate on the authentication server
Answer: D