Page 1 of 81
SANS SEC401 MODULE EXAM VERSION WITH
COMPLETE 300 QUESTIONS AND WELL
ELABORATED ANSWERS JUST RELEASED
QUESTION: Which part of IEEE 802 specifically defines the set of protocols for implementing
wireless local area networks?
a) IEEE 802.1
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.1x - ANSWER✔✔c) IEEE 802.11
- book 1, page 171
QUESTION: Which of the following TCP packet flags indicates that a connection is being shut
down in a graceful fashion?
a) URG
b) FIN
c) ACK
, Page 2 of 81
d) RST - ANSWER✔✔b) FIN
- book 1, page 89
QUESTION: In what type of isolation violation does a malicious actor leverage a compromised
VM to execute code on the host computer?
a) VM escape
b) VM resource overloading
c) VM hyperjacking
d) VM sprawl - ANSWER✔✔a) VM escape
- book 1, page 119
QUESTION: Which of the following describes the responsibility for security in a cloud
environment?
a) No responsibility for security
b) Full responsibility of cloud provider
c) Shared responsibility between the cloud provider and cloud subscriber
d) Full responsibility of cloud subscriber - ANSWER✔✔c) Shared responsibility between the
cloud provider and cloud subscriber
, Page 3 of 81
- book 1, page 137
QUESTION: What is the term for an individual, organization, or group who is capable and
motivated to carry out an attack?
a) Threat agent
b) Threat proxy
c) Hacktivist
d) Nation state - ANSWER✔✔a) Threat agent
- book 1, page 30
QUESTION: Which of the following layers of the OSI protocol stack handles the establishment
and maintenance of connections?
a) Network
b) Session
c) Presentation
d) Transport - ANSWER✔✔b) Session
- book 1, page 56
, Page 4 of 81
QUESTION: Which of the following is true regarding a TCP/IP packet being generated as it travels
down the stack?
a) Each layer removes the previous header and adds its own.
b) The packet directly connects to the peer layer on the target device.
c) Each layer removes a header.
d) Each layer adds a header. - ANSWER✔✔d) Each layer adds a header.
QUESTION: Which of the following IEEE 802.11 amendments was created to deliver the feature
set required to handle the upcoming strain that will be put on WLAN?
a) 802.11ax
b) 802.11bg
c) 802.11n
d) 802.11ac - ANSWER✔✔a) 802.11ax
- book 1, page 181
QUESTION: Threat enumeration is a part of the overall concept known as threat intelligence,
which helps to understand the TTP of adversaries. Which of the TTPs is a high-level description?
SANS SEC401 MODULE EXAM VERSION WITH
COMPLETE 300 QUESTIONS AND WELL
ELABORATED ANSWERS JUST RELEASED
QUESTION: Which part of IEEE 802 specifically defines the set of protocols for implementing
wireless local area networks?
a) IEEE 802.1
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.1x - ANSWER✔✔c) IEEE 802.11
- book 1, page 171
QUESTION: Which of the following TCP packet flags indicates that a connection is being shut
down in a graceful fashion?
a) URG
b) FIN
c) ACK
, Page 2 of 81
d) RST - ANSWER✔✔b) FIN
- book 1, page 89
QUESTION: In what type of isolation violation does a malicious actor leverage a compromised
VM to execute code on the host computer?
a) VM escape
b) VM resource overloading
c) VM hyperjacking
d) VM sprawl - ANSWER✔✔a) VM escape
- book 1, page 119
QUESTION: Which of the following describes the responsibility for security in a cloud
environment?
a) No responsibility for security
b) Full responsibility of cloud provider
c) Shared responsibility between the cloud provider and cloud subscriber
d) Full responsibility of cloud subscriber - ANSWER✔✔c) Shared responsibility between the
cloud provider and cloud subscriber
, Page 3 of 81
- book 1, page 137
QUESTION: What is the term for an individual, organization, or group who is capable and
motivated to carry out an attack?
a) Threat agent
b) Threat proxy
c) Hacktivist
d) Nation state - ANSWER✔✔a) Threat agent
- book 1, page 30
QUESTION: Which of the following layers of the OSI protocol stack handles the establishment
and maintenance of connections?
a) Network
b) Session
c) Presentation
d) Transport - ANSWER✔✔b) Session
- book 1, page 56
, Page 4 of 81
QUESTION: Which of the following is true regarding a TCP/IP packet being generated as it travels
down the stack?
a) Each layer removes the previous header and adds its own.
b) The packet directly connects to the peer layer on the target device.
c) Each layer removes a header.
d) Each layer adds a header. - ANSWER✔✔d) Each layer adds a header.
QUESTION: Which of the following IEEE 802.11 amendments was created to deliver the feature
set required to handle the upcoming strain that will be put on WLAN?
a) 802.11ax
b) 802.11bg
c) 802.11n
d) 802.11ac - ANSWER✔✔a) 802.11ax
- book 1, page 181
QUESTION: Threat enumeration is a part of the overall concept known as threat intelligence,
which helps to understand the TTP of adversaries. Which of the TTPs is a high-level description?