CompTIA Security+ Certification v36.0 (SY0-401)

Page:    1 / 119   
Total 1780 questions

Which of the following uses port 22 by default? (Select THREE).

  • A. SSH
  • B. SSL
  • C. TLS
  • D. SFTP
  • E. SCP
  • F. FTPS
  • G. SMTP
  • H. SNMP


Answer : A,D,E

Explanation:
SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP,
SExec, and slogin, also use TCP port 22.

A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?

  • A. Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP
  • B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS
  • C. Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS
  • D. Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS


Answer : B

Explanation:
The question states that traffic on port 21, 69, 80, and 137-139 is blocked, while ports 22 and 443 are allowed.
Port 21 is used for FTP by default.
Port 69 is used for TFTP.
Port 80 is used for HTTP.
Ports 137-139 are used for NetBIOS.
VMM uses SFTP over default port 22.
Port 22 is used for SSH by default.
SCP runs over TCP port 22 by default.
Port 443 is used for HTTPS.

Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?

  • A. TCP 23
  • B. UDP 69
  • C. TCP 22
  • D. TCP 21


Answer : C

Explanation:
SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP,
SExec, and slogin, also use TCP port 22. Secure Copy Protocol (SCP) is a secure file- transfer facility based on SSH and Remote Copy Protocol (RCP). Secure FTP (SFTP) is a secured alternative to standard File Transfer Protocol (FTP).

Which of the following devices is MOST likely being used when processing the following?
1 PERMIT IP ANY ANY EQ 80
2 DENY IP ANY ANY

  • A. Firewall
  • B. NIPS
  • C. Load balancer
  • D. URL filter


Answer : A

Explanation:
Firewalls, routers, and even switches can use ACLs as a method of security management.
An access control list has a deny ip any any implicitly at the end of any access control list.
ACLs deny by default and allow by exception.

Which of the following offers the LEAST amount of protection against data theft by USB drives?

  • A. DLP
  • B. Database encryption
  • C. TPM
  • D. Cloud computing


Answer : D

Explanation:
Cloud computing refers to performing data processing and storage elsewhere, over a network connection, rather than locally. Because users have access to the data, it can easily be copied to a USB device.

The server administrator has noted that most servers have a lot of free disk space and low memory utilization. Which of the following statements will be correct if the server administrator migrates to a virtual server environment?

  • A. The administrator will need to deploy load balancing and clustering.
  • B. The administrator may spend more on licensing but less on hardware and equipment.
  • C. The administrator will not be able to add a test virtual environment in the data center.
  • D. Servers will encounter latency and lowered throughput issues.


Answer : B

Explanation:
Migrating to a virtual server environment reduces cost by eliminating the need to purchase, manage, maintain and power physical machines. The fewer physical machines you have, the less money it costs.

Which of the following is a programming interface that allows a remote computer to run programs on a local machine?

  • A. RPC
  • B. RSH
  • C. SSH
  • D. SSL


Answer : A

Explanation:
Remote Procedure Call (RPC) is a programming interface that allows a remote computer to run programs on a local machine.

Which of the following ports and protocol types must be opened on a host with a host- based firewall to allow incoming SFTP connections?

  • A. 21/UDP
  • B. 21/TCP
  • C. 22/UDP
  • D. 22/TCP


Answer : D

Explanation:
SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP,
SExec, and slogin, also use TCP port 22.

A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used?

  • A. RC4
  • B. DES
  • C. 3DES
  • D. AES


Answer : D

Explanation:
Cipher Block Chaining Message Authentication Code Protocol (CCMP) makes use of 128- bit AES encryption with a 48-bit initialization vector.

Which of the following is a directional antenna that can be used in point-to-point or point-to- multi-point WiFi communication systems? (Select TWO).

  • A. Backfire
  • B. Dipole
  • C. Omni
  • D. PTZ
  • E. Dish


Answer : A,E

Explanation:
Both the Backfire and the Dish antennae are high gain antenna types that transmit a narrow beam of signal. It can therefore be used as a point-to-point antenna over short distances, but as point-to-multi-point antenna over longer distances.

A security technician needs to open ports on a firewall to allow for domain name resolution.
Which of the following ports should be opened? (Select TWO).

  • A. TCP 21
  • B. TCP 23
  • C. TCP 53
  • D. UDP 23
  • E. UDP 53


Answer : C,E

Explanation:
DNS uses TCP and UDP port 53. TCP port 53 is used for zone transfers, whereas UDP port 53 is used for queries.

Pete, a security engineer, is trying to inventory all servers in a rack. The engineer launches
RDP sessions to five different PCs and notices that the hardware properties are similar.
Additionally, the MAC addresses of all five servers appear on the same switch port. Which of the following is MOST likely the cause?

  • A. The system is running 802.1x.
  • B. The system is using NAC.
  • C. The system is in active-standby mode.
  • D. The system is virtualized.


Answer : D

Explanation:
Virtualization allows a single set of hardware to host multiple virtual machines.

Due to limited resources, a company must reduce their hardware budget while still maintaining availability. Which of the following would MOST likely help them achieve their objectives?

  • A. Virtualization
  • B. Remote access
  • C. Network access control
  • D. Blade servers


Answer : A

Explanation:
Because Virtualization allows a single set of hardware to host multiple virtual machines, it requires less hardware to maintain the current scenario.

A security engineer, Joe, has been asked to create a secure connection between his mail server and the mail server of a business partner. Which of the following protocol would be
MOST appropriate?

  • A. HTTPS
  • B. SSH
  • C. FTP
  • D. TLS


Answer : D

Explanation: Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom it is communicating, and to exchange a symmetric key. The TLS protocol allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering.

A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?

  • A. Implement a virtual firewall
  • B. Install HIPS on each VM
  • C. Virtual switches with VLANs
  • D. Develop a patch management guide


Answer : C

Explanation:
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. VLANs can be used to isolate traffic between network segments.

Page:    1 / 119   
Total 1780 questions