100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SANS SEC401 CORE EXAMS MANUAL QUESTIONS AND SOLUTIONS MARKED A+

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
25-10-2025
Written in
2025/2026

SANS SEC401 CORE EXAMS MANUAL QUESTIONS AND SOLUTIONS MARKED A+

Institution
SANS SEC401
Course
SANS SEC401










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS SEC401
Course
SANS SEC401

Document information

Uploaded on
October 25, 2025
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS SEC401 CORE EXAMS MANUAL QUESTIONS AND
SOLUTIONS MARKED A+
What is the term for an individual, organization, or group who is capable and motivated
to carry out an attack?

a) Threat agent
b) Threat proxy
c) Hacktivist
d) Nation state - ✔✔a) Threat agent
- book 1, page 30

Which of the following layers of the OSI protocol stack handles the establishment and
maintenance of connections?

a) Network
b) Session
c) Presentation
d) Transport - ✔✔b) Session
- book 1, page 56

What is a method adopted by IEEE 802.11n that results in higher bandwidth?

a) Multiple input single output
b) Single input multiple output
c) Multiple input multiple output
d) Single input single output - ✔✔c) Multiple input multiple output
- book 1, page 177

Which of the following presents simulated hardware to the virtual machine OS?

a) Physical BIOS settings
b) Host OS
c) Device manager from physical system
d) Hypervisor - ✔✔d) Hypervisor
- book 1, page 110

Designed to be a software upgrade to existing devices that supported WEP, which of
the following security protocols utilizes RC4 and TKIP to provide data communication
confidentiality?

a) WPA1
b) Enhanced WEP
c) WPA3
d) WPA2 - ✔✔a) WPA1
- book 1, page 194

,What is an often-ignored IT asset in security hardening?

a) Servers
b) Routers
c) Applications
d) Desktops - ✔✔b) routers
- book 1, page 27

What security framework provides cloud security guidance across 14 domains?

a) COBIT
b) CSA Cloud Controls Matrix
c) ISO 27000
d) NIST 800-53R4 / FedRAMP - ✔✔b) CSA Cloud Controls Matrix
- book 1, page 144

Which of the following maps the components of the conceptual design via the use of a
network diagram?

a) Conceptual design
b) Logical design
c) Enterprise design
d) Physical design - ✔✔b) Logical design
- book 1, page 19

What principle of Know Your Environment understands the value of a senior leader's
laptop?

a) Knowing the physical design of communication
b) Knowing the logical design of valuable data
c) Knowing the flow of communication
d) Knowing the location of valuable data - ✔✔d) Knowing the location of valuable data
- book 1, page 22

Which layer 4 protocol is a good multicast solution for optimized real-time
communications delivered over a wireless network?

a) UDP
b) ICMP
c) IP
d) TCP - ✔✔a) UDP
- book 1, page 93

What term characterizes a virtual Kali Linux machine running on a Windows 10
computer?

, a) Guest OS
b) Hypervisor OS
c) Default OS
d) Host OS - ✔✔a) Guest OS
- book 1, page 110

What is a benefit of cloud computing compared to an on-premise data center?

a) Trading away variable operating costs for fixed capital costs
b) Resources take up to a month to provision
c) On-demand resources at the speed of business
d) Greater control of infrastructure - ✔✔c) On-demand resources at the speed of
business
- book 1, page 125

What is a foundational principle of zero-trust?

a) Every user, device, or network connection must be proven.
b) Block all network traffic to/from sensitive networks.
c) Developers and system admins cannot be trusted.
d) Threats from the outside are most important. - ✔✔a) Every user, device, or network
connection must be proven
- book 2, page ___

A security analyst seeks to control the risk of unauthorized copying to critical files
associated with external drives. Which of the following control actions uses the concept
of vector-oriented defense-in-depth?

a) Isolating the work groups with access to the critical files
b) Disabling the ability to update critical files
c) Isolating critical files using layered protection
d) Disabling USB - ✔✔d) Disabling USB
- book 2, page 20

What Authenticator Assurance Level is the following an example of: a user
authentication by using an email address and password (involving cryptographic
algorithm) and by completing an SMS process?

a) AAL 2
b) AAL 1
c) AAL 4
d) AAL 3 - ✔✔a) AAL 2
- book 2, page ___

What can be used to provide common grounds for effectiveness of security measures?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMCAFE Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
104
Member since
10 months
Number of followers
3
Documents
11120
Last sold
1 week ago
EXAM CAFE

Welcome to Exam Docs Hub, the ultimate online destination for high-quality exam documents, study guides, and academic resources to help you excel in your studies! Whether you're preparing for final exams, standardized tests, certifications, or coursework, we provide comprehensive and well-structured materials to boost your confidence and performance. Our collection includes: ✅ Past exam papers for various subjects ✅ Study guides & summaries to simplify learning ✅ Practice tests & quizzes to assess your knowledge ✅ Detailed solutions & answer keys for effective revision At Exam Docs Hub, we prioritize accuracy, quality, and accessibility. Our resources are carefully curated to meet the needs of students, educators, and professionals. With instant downloads and user-friendly access,

Read more Read less
3.2

14 reviews

5
5
4
2
3
2
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions