Download New Updated (July) CompTIA SY0-401 Actual Test 531-540

Ensurepass

 

QUESTION 531

A program has been discovered that infects a critical Windows system executable and stays dormant in memory. When a Windows mobile phone is connected to the host, the program infects the phone’s boot loader and continues to target additional Windows PCs or phones. Which of the following malware categories BEST describes this program?

 

A.

Zero-day

B.

Trojan

C.

Virus

D.

Rootkit

 

Correct Answer: C

 

 

QUESTION 532

A user has unknowingly gone to a fraudulent site. The security analyst notices the following system change on the user’s host:

 

Old `hosts’ file:

127.0.0.1 localhost

 

New `hosts’ file:

127.0.0.1 localhost

 

5.5.5.5 www.comptia.com

 

Which of the following attacks has taken place?

 

A.

Spear phishing

B.

Pharming

C.

Phishing

D.

Vishing

 

Correct Answer: B

 

 

QUESTION 533

An investigator recently discovered that an attacker placed a remotely accessible CCTV camera in a public area overlooking several Automatic Teller Machines (ATMs). It is also believed that user accounts belonging to ATM operators may have been compromised. Which of the following attacks has MOST likely taken place?

 

A.

Shoulder surfing

B.

Dumpster diving

C.

Whaling attack

D.

Vishing attack

 

Correct Answer: A

 

 

QUESTION 534

A user commuting to work via public transport received an offensive image on their smart phone from another commuter. Which of the following attacks MOST likely took place?

 

A.

War chalking

B.

Bluejacking

C.

War driving

D.

Bluesnarfing

 

Correct Answer: B

 

 

QUESTION 535

An attacker attempted to compromise a web form by inserting the following input into the username field:

 

admin)(|(password=*))

 

Which of the following types of attacks was attempted?

 

A.

SQL injection

B.

Cross-site scripting

C.

Command injection

D.

LDAP injection

 

Correct Answer: D

 

 

QUESTION 536

Which of the following is BEST carried out immediately after a security breach is discovered?

 

A.

Risk transference

B.

Access control revalidation

C.

Change management

D.

Incident management

 

Correct Answer: D

 

 

 

 

 

 

 

 

 

QUESTION 537

Which of the following BEST describes the type of attack that is occurring?

 

clip_image002

 

 

clip_image004

 

clip_image005

 

 

clip_image006

 

A.

Smurf Attack

B.

Man in the middle

C.

Backdoor

D.

Replay

E.

Spear Phishing

F.

Xmas Attack

G.

Blue Jacking

H.

Ping of Death

 

Correct Answer: A

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 538

Which of the following BEST describes the type of attack that is occurring? (Select TWO).

 

clip_image008

clip_image010

 

clip_image012

clip_image014

 

 

clip_image016

clip_image018

 

 

clip_image020

 

A.

DNS spoofing

B.

Man-in-the-middle

C.

Backdoor

D.

Replay

E.

ARP attack

F.

Spear phishing

G.

Xmas attack

 

Correct Answer: AE

 

 

QUESTION 539

Which of the following is a hardware-based security technology included in a computer?

 

A.

Symmetric key

B.

Asymmetric key

C.

Whole disk encryption

D.

Trusted platform module

 

Correct Answer: D

 

 

 

 

 

 

 

QUESTION 540

Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking Pete’s access to this site?

 

A.

Internet content filter

B.

Firewall

C.

Proxy server

D.

Protocol analyzer

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized and tagged , , , , , , . Bookmark the permalink.