Which of the following MUST be implemented to support t…

A system administrator wants to ensure that only authorized devices can connect to the wired and wireless corporate system. Unauthorized devices should be
automatically be placed on a guest network. Which of the following MUST be implemented to support these requirements? (Select TWO).

A system administrator wants to ensure that only authorized devices can connect to the wired and wireless corporate system. Unauthorized devices should be
automatically be placed on a guest network. Which of the following MUST be implemented to support these requirements? (Select TWO).

A.
Port security

B.
802.1X

C.
Proxy

D.
VLAN

E.
NAT



Leave a Reply to Vke Cancel reply50

Your email address will not be published. Required fields are marked *

6 + 9 =


Peter

Peter

Just took the test on may 16th, 2017 and passed. Im in the United States. A lot of these questions were on the exam. I went through this list and marked which one’s I had gotten wrong, went back and did them again. I had 6 simulation questions on my exam, and there are no simulation questions in this list. Go to this website: http://comptiaexamtest.com/Security+SY0-401/
The simulation questions are the following #’s:
32,33,240,492,507,508,517,520,860,908,930,1360
These sim questions were exactly like the ones I had on my test. With answers re-arranged.
A lot of the same questions here are on that website as well, but that website had A LOT of wrong answers.

Anyways, You’re welcome. I wish somebody would have done all of this for me, so just passing it along.

Peace.

Jacques

Jacques

Thanks Bud

Ernesto

Ernesto

Hey thank you bro I’m getting ready to study for mine and going crazy about which study material to use.

f

f

Thank you,

did you have a sim where a hacker uses a tablet to break in to the network?

Vke

Vke

Peter do you speak about v6 exam questions ???

ang

ang

Peter – you’re a stud!!
Just passed the exam today with a 796.
Sim questions were right on point and a lot of the v6 questions appeared.
Professor Messer is also a great resource.
http://www.professormesser.com/security-plus/sy0-401/sy0-401-course-index/

suzzy

suzzy

congrats ang. how many sim questions did you get? did you finish on time? and do you think V6 answers are correct?
thank you for your response.

ang

ang

hi suzzy
i think i had 6 sim questions – all of the ones that Peter listed above.
only a handful of the v6 answers are incorrect; make sure you read the comments to make your own conclusions.
yes, i had enough time to finish and review all of the questions i marked for review.
good luck!

suzzy

suzzy

Thank you Ang.

Will update you soon. right now I’m on it!!!!

thanx

MrTwoTall

MrTwoTall

This is going to help a lot with my prep. I am writing on the 6/6/2017.

f

f

good luck with your exam

let us know how you do

Blake

Blake

Was it just from this latest V6 list you studied from? Thanks

Peter

Peter

I studied from many different sources. But I spent most of my time here.

Blake

Blake

Great, thanks. Taking mine next week and have been hitting this and my actual study material hard

Peter

Peter

Good Luck Man. Be sure to take a good look at those sim questions from the other website I posted above, as well.

Blake

Blake

Thanks will do!

Sarah

Sarah

But the answers are wrong on the comptia site?

Peter

Peter

The sim questions are correct on the comptiaexamtest website.

MilkChewy

MilkChewy

Just got certified on Jun 16 while studying mainly on this site with SY401 v6. There were a lot of questions here appeared in the test, and the sims mentioned by Peter. One sim stumped me was setting up WPA2-Enterprise, given WAP and a few servers. You guys might want to familiarize that as well.

BobbyBlue

BobbyBlue

Just passed. I recommend you go through all 500 questions on here and don’t just memorize, realize. For the simulation questions I agree with Peter, most of the questions simulation questions were exactly the same as the ones he mentioned.
good luck!

David

David

Planning to take Sec+ in the next two weeks. Does anyone knows/have new update please?

unda

unda

I just took the exam and passed on 7/26/17. These questions are really helpful, and some of them did show up; your mileage may vary. Also, the specific simulation questions Peter mentioned were spot on for me.

Vke

Vke

Hey , some of this questions or a lot of ?????

What could you recomend ?

thk

Vke

Vke

and does v3 v4 v5 valid questions???? give pls some information

unda

unda

Not everything from this list was on my test. Yours will be different. I only looked through this list of questions, but I’m sure the other versions are good practice as well. Know the material; be able to apply it to specific scenarios. As long as you can do that, you’ll be fine. Don’t stress out!

Vke

Vke

Hey guys !
I have passed my Security+ exam . Thank you all !

There was 70 question with 2 sim.

All questions u can find here , ther is a mixxed questions from v1,v2,v3 …etc …. also sim question exactly same that provide Peter (thank you)

But I find some question that i have never seen before ….to avoide that situation read books .

Sophia

Sophia

Hello, 2017 August New SY0-401 exam questions has been updated today!
QUESTION 91
A security administrator wishes to increase the security of the wireless network. Which of the following BEST addresses this concern?

A. Change the encryption from TKIP-based to CCMP-based.
B. Set all nearby access points to operate on the same channel.
C. Configure the access point to use WEP instead of WPA2.
D. Enable all access points to broadcast their SSIDs.

Answer: A
Explanation:
CCMP makes use of 128-bit AES encryption with a 48-bit initialization vector.
This initialization vector makes cracking a bit more difficult.

QUESTION 92
The security administrator has been tasked to update all the access points to provide a more secure connection. All access points currently use WPA TKIP for encryption.
Which of the following would be configured to provide more secure connections?

A. WEP
B. WPA2 CCMP
C. Disable SSID broadcast and increase power levels
D. MAC filtering

Answer: B
Explanation:
CCMP makes use of 128-bit AES encryption with a 48-bit initialization vector.
This initialization vector makes cracking a bit more difficult.

QUESTION 93
A system administrator wants to enable WPA2 CCMP.
Which of the following is the only encryption used?

A. RC4
B. DES
C. 3DES
D. AES

Answer: D
Explanation:
Cipher Block Chaining Message Authentication Code Protocol (CCMP) makes use of 128-bit AES encryption with a 48-bit initialization vector.

QUESTION 94
Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point?

A. Placement of antenna
B. Disabling the SSID
C. Implementing WPA2
D. Enabling the MAC filtering

Answer: A
Explanation:
You should try to avoid placing access points near metal (which includes appliances) or near the ground. Placing them in the center of the area to be served and high enough to get around most obstacles is recommended. On the chance that the signal is actually traveling too far, some access points include power level controls, which allow you to reduce the amount of output provided.

QUESTION 95
A security team has identified that the wireless signal is broadcasting into the parking lot.
To reduce the risk of an attack against the wireless network from the parking lot, which of the following controls should be used? (Select TWO).

A. Antenna placement
B. Interference
C. Use WEP
D. Single Sign on
E. Disable the SSID
F. Power levels

Answer: AF
Explanation:
Placing the antenna in the correct position is crucial. You can then adjust the power levels to exclude the parking lot.

QUESTION 96
Which of the following would Pete, a security administrator, do to limit a wireless signal from penetrating the exterior walls?

A. Implement TKIP encryption
B. Consider antenna placement
C. Disable the SSID broadcast
D. Disable WPA

Answer: B
Explanation:
Cinderblock walls, metal cabinets, and other barriers can reduce signal strength significantly. Therefore, antenna placement is critical.

QUESTION 97
Ann, a security administrator, has concerns regarding her company’s wireless network.
The network is open and available for visiting prospective clients in the conference room, but she notices that many more devices are connecting to the network than should be.
Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality for clients?

A. Enable MAC filtering on the wireless access point.
B. Configure WPA2 encryption on the wireless access point.
C. Lower the antenna’s broadcasting power.
D. Disable SSID broadcasting.

Answer: C
Explanation:
Some access points include power level controls that allow you to reduce the amount of output provided if the signal is traveling too far.

QUESTION 98
After reviewing the firewall logs of her organization’s wireless APs, Ann discovers an unusually high amount of failed authentication attempts in a particular segment of the building. She remembers that a new business moved into the office space across the street. Which of the following would be the BEST option to begin addressing the issue?

A. Reduce the power level of the AP on the network segment
B. Implement MAC filtering on the AP of the affected segment
C. Perform a site survey to see what has changed on the segment
D. Change the WPA2 encryption key of the AP in the affected segment

Answer: A
Explanation:
Some access points include power level controls that allow you to reduce the amount of output provided if the signal is traveling too far.

QUESTION 99
An administrator wants to establish a WiFi network using a high gain directional antenna with a narrow radiation pattern to connect two buildings separated by a very long distance. Which of the following antennas would be BEST for this situation?

A. Dipole
B. Yagi
C. Sector
D. Omni

Answer: B
Explanation:
A Yagi-Uda antenna, commonly known simply as a Yagi antenna, is a directional antenna consisting of multiple parallel dipole elements in a line, usually made of metal rods. It consists of a single driven element connected to the transmitter or receiver with a transmission line, and additional parasitic elements: a so-called reflector and one or more directors. The reflector element is slightly longer than the driven dipole, whereas the directors are a little shorter. This design achieves a very substantial increase in the antenna’s directionality and gain compared to a simple dipole.

QUESTION 100
A company has recently implemented a high density wireless system by having a junior technician install two new access points for every access point already deployed.
Users are now reporting random wireless disconnections and slow network connectivity.
Which of the following is the MOST likely cause?

A. The old APs use 802.11a
B. Users did not enter the MAC of the new APs
C. The new APs use MIMO
D. A site survey was not conducted

Answer: D
Explanation:
To test the wireless AP placement, a site survey should be performed.

More new sy0-301 exam questions from:https://drive.google.com/drive/folders/0B75b5xYLjSSNTGpRd0d5cDZiQm8?usp=sharing

Sophia

Sophia

Besides, you also can get 2017 Latest SY0-401 PDF and VCE 1868q&as from:https://www.braindump2go.com/sy0-401.html, they can offer you latest questions in step with CompTIA Official Center.

suzzy

suzzy

hi Sophia
have you taken the exam yet? if not when do you intend to? what study materials are you focusing on?
thank you.

Jalal

Jalal

Hi everyone. Who can say this 500questions valid? because include v4,v5 question have many wrong answers

Jalal

Jalal

Who can say. Answers which written on comments of many questions valid or not?

Jalal

Jalal

Today passed with 787 point. Thanks all who write here comment

Jimmy

Jimmy

Jalal, were the questions from this version?

Jalal

Jalal

Yes all question from aiotestking. But v3,v4,v5,v6 all version have question. For example my first question from v3 890 sim question

Laura

Laura

Hi Jalal, do you have CompTIA Cloud+ cv0-001 knowledge?

Jalal

Jalal

Hi Laura i have not wish earn Cloud+ certificate yet. My wish only security sphere

Mike

Mike

Hi Jalal is it really all question from here?

Jalal

Jalal

Hi Mike. Not all question, some question from here. You must read book absolutely. I read Security+ book twice

P

P

Thank you so much everyone for all the inputs and comments. I just passed the exam yesterday in US. Special thanks to Peter for giving the sim numbers ( I got 5 out of 6 sims (32,240,507,508,930)from the ones you mentioned)on the other site. I got at least 50% questions out of this particular version. There were at least 3 to 4 Linux based questions which I am sure I got wrong because I am not familiar with the OS at all. The material I studies was CBT nugget videos and professor messer videos. Thanks again everyone for your input.

John

John

Listen everyone, I don’t work for comptia and I don’t know anyone that does but I can tell you this. I just passed my exam recently (barely) and not 1 single question from any of these dumps regardless where you get them from were on the exam except 1 and only 1 performance based question. That was it. These dumps may have worked at one time but since Comptia has cracked down on dumps you could be rest assured that you will NOT get any questions from any dumps. If you do than your lucky. Think about it, anyone can buy a membership especially someone that may work for Comptia and adjust there exams accordingly. I’ve looked just to see what was out there for myself for what one vendor was offering vs. another and guess what there all the same dumps and no good anymore. In my opinion dumps may only be good for drilling concepts and understanding of a different way of interpreting questions but don’t think those questions you will see on an exam. I know many of you may not want to hear this, but you need to study big time, the exam is hard. I’m telling you don’t waste your hard earned $$$ on these dumps. All they are, are recycled PDF’s and test engines that don’t apply anymore. I would recommend for studying material, Professor Messer from YouTube and his book, Wikipedia believe it or not, very informative and various online websites that offer quick drills for protocols and ports numbers.

DaveyBoy

DaveyBoy

just passed the test today. gotta say though there was very few questions from here in it. read the books over and over. the questions here did help but only because i researched the topics they related to

Rod

Rod

Just passed the test today. Peter’s reference to the simulation questions were spot on (although i only got 4 in total)! They were almost exactly like it.
Before actually taking the test i would recommend going down the list of Objectives and make sure you understand each concept and how its used in a real life scenario and you should pass. Best of luck everyone, thank you for everything.

Gabriel Arias

Gabriel Arias

ATTENTION PLEASE!!!

The SY0-401 Exam Will Retire On July 31, 2018, and then the New Exam is SY0-501!

New SY0-501 Exam Questions Updated Recently (7/Nov/2017):

NEW QUESTION 127
As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technician must ensure the OS settings are hardened. Which of the following is the BEST way to do this?

A. Use a vulnerability scanner.
B. Use a configuration compliance scanner.
C. Use a passive, in-line scanner.
D. Use a protocol analyzer.

Answer: A

NEW QUESTION 128
Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were unable to find the application in the app stores. Which of the following allowed Joe to install the application? (Select TWO.)

A. Near-field communication
B. Rooting/jailbreaking
C. Ad-hoc connections
D. Tethering
E. Sideloading

Answer: AB

NEW QUESTION 129
A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and does not have network access. Which of the following types of attacks are MOST likely occurring? (Select TWO.)

A. Replay
B. Rainbow tables
C. Brute force
D. Pass the hash
E. Dictionary

Answer: DE

NEW QUESTION 130
A user has attempted to access data at a higher classification level than the user’s account is currency authorized to access. Which of the following access control models has been applied to this user’s account?

A. MAC
B. DAC
C. RBAC
D. ABAC

Answer: D

NEW QUESTION 131
A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?

A. Transferring the risk
B. Accepting the risk
C. Avoiding the risk
D. Mitigating the risk

Answer: A

NEW QUESTION 132
An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified?

A. RTO
B. RPO
C. MTBF
D. MTTR

Answer: B

NEW QUESTION 133
An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, impact of similar incidents. Which of the following would assist Company.com with its goal?

A. Certificate pinning
B. Certificate stapling
C. Certificate chaining
D. Certificate with extended validation

Answer: D

NEW QUESTION 134
Malicious traffic from an internal network has been detected on an unauthorized port on an application server. Which of the following network-based security controls should the engineer consider implementing?

A. ACLs
B. HIPS
C. NAT
D. MAC filtering

Answer: D

NEW QUESTION 135
A company wants to host a publicly available server that performs the following functions:
– Evaluates MX record lookup
– Can perform authenticated requests for A and AAA records
– Uses RRSIG
Which of the following should the company use to fulfill the above requirements?

A. DNSSEC
B. SFTP
C. nslookup
D. dig

Answer: C

NEW QUESTION 136
Which of the following attack types BEST describes a client-side attack that is used to mandate an HTML iframe with JavaScript code via web browser?

A. MITM
B. xss
C. SQLi

Answer: B

NEW QUESTION 137
A company has a data classification system with definitions for “Private” and “public”. The company’s security policy outlines how data should be protected based on type. The company recently added the data type “Proprietary”. Which of the following is the MOST likely reason the company added this data type?

A. Reduced cost
B. More searchable data
C. Better data classification
D. Expanded authority of the privacy officer

Answer: B

NEW QUESTION 138
A security administrator is developing training for corporate users on basic security principles for personal email accounts. Which of the following should be mentioned as the MOST secure way for password recovery?

A. Utilizing a single Qfor password recovery
B. Sending a PIN to a smartphone through text message
C. Utilizing CAPTCHA to avoid brute force attacks
D. Use a different e-mail address to recover password

Answer: B

NEW QUESTION 139
A company researched the root cause of a recent vulnerability in its software. It was determined that the vulnerability was the result of two updates made in the last release. Each update alone would not have resulted in the vulnerability. In order to prevent similar situations in the future, the company should improve which of the following?

A. Change management procedures
B. Job rotation policies
C. Incident response management
D. Least privilege access controls

Answer: A

NEW QUESTION 140
A computer on a company network was infected with a zero-day exploit after an employee accidently opened an email that contained malicious content. The employee recognized the email as malicious and was attempting to delete it, but accidently opened it. Which of the following should be done to prevent this scenario from occurring again in the future?

A. Install host-based firewalls on all computers that have an email client installed
B. Set the email program default to open messages in plain text
C. Install end-point protection on all computers that access web email
D. Create new email spam filters to delete all messages from that sender

Answer: C

NEW QUESTION 141
……

P.S. These New SY0-501 Exam Questions Were Just Updated From The Real SY0-501 Exam, You Can Get The Newest SY0-501 Dumps In PDF And VCE From — https://www.passleader.com/sy0-501.html (166q VCE and PDF)

Good Luck!

Gur Erem

Gur Erem

ATTENTION PLEASE!!! The SY0-401 Exam Will Retire On July 31, 2018, and then the New Exam is SY0-501!

New SY0-501 Exam Questions and Answers Updated Recently (28/Dec/2017):

Lab Simulation 1 — Available Security Controls for Each Building
You have just received some room and WiFi access control recommendations from a security consulting company. Click on each building to bring up available security controls. Please implement the following requirements:
……

Lab Simulation 2 — Configure the Firewall
Configure the firewall (fill out the table) to allow these four rules:
– Only allow the Accounting computer to have HTTPS access to the Administrative server.
– Only allow the HR computer to be able to communicate with the Server 2 System over SCP.
– Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2.
……

NEW QUESTION 142
An administrator intends to configure an IPSec solution that provides ESP with integrity protection, but not confidentiality protection. Which of the following AES modes of operation would meet this integrity-only requirement?

A. HMAC
B. PCBC
C. CBC
D. GCM
E. CFB

Answer: A

NEW QUESTION 143
The Chief Security Officer (CSO) has issued a new policy that requires that all internal websites be configured for HTTPS traffic only. The network administrator has been tasked to update all internal sites without incurring additional costs. Which of the following is the best solution for the network administrator to secure each internal website?

A. Use certificates signed by the company CA.
B. Use a signing certificate as a wild card certificate.
C. Use certificates signed by a public CA.
D. Use a self-signed certificate on each internal server.

Answer: D

NEW QUESTION 144
A security program manager wants to actively test the security posture of a system. The system is not yet in production and has no uptime requirement or active user base. Which of the following methods will produce a report which shows vulnerabilities that were actually exploited?

A. Peer review
B. Component testing
C. Penetration testing
D. Vulnerability testing

Answer: C
Explanation:
A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities.

NEW QUESTION 145
A new intern in the purchasing department requires read access to shared documents. Permissions are normally controlled through a group called “purchasing”, however, the purchasing group permissions allow write access. Which of the following would be the BEST course of action?

A. Modify all the shared files with read only permissions for the intern.
B. Create a new group that has only read permissions for the files.
C. Remove all permissions for the shared files.
D. Add the intern to the “purchasing” group.

Answer: B

NEW QUESTION 146
A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while traveling, and a high amount of wireless mobile use is expected. To protect the laptops while connected to untrusted wireless networks, which of the following would be the BEST method for reducing the risk of having the laptops compromised?

A. MAC filtering
B. Virtualization
C. OS hardening
D. Application white-listing

Answer: C

NEW QUESTION 147
A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format?

A. PFX
B. PEM
C. DER
D. CER

Answer: B

NEW QUESTION 148
When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select TWO.)

A. USB-attached hard disk
B. Swap/pagefile
C. Mounted network storage
D. ROM
E. RAM

Answer: AD

NEW QUESTION 149
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?

A. Owner
B. System
C. Administrator
D. User

Answer: C

NEW QUESTION 150
……

NEW QUESTION 151
A user clicked an email link that led to a website that infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not detected or blocked by the company’s email filter, website filter, or antivirus. Which of the following describes what occurred?

A. The user’s account was over-privileged.
B. Improper error handling triggered a false negative in all three controls.
C. The email originated from a private email server with no malware protection.
D. The virus was a zero-day attack.

Answer: A

NEW QUESTION 152
Which of the fallowing security controls does an iris scanner provide?

A. Logical
B. Administrative
C. Corrective
D. Physical
E. Detective
F. Deterrent

Answer: D

NEW QUESTION 153
……

P.S. These New SY0-501 Exam Questions Were Just Updated From The Real SY0-501 Exam, You Can Get The Newest SY0-501 Dumps In PDF And VCE From — https://www.passleader.com/sy0-501.html (182q VCE and PDF)

Good Luck!