SY0-401 : CompTIA Security+ Lab SY0-401

CompTIA Security+ Lab SY0-401
ISBN : 9781616913458
Rating :
Gain hands-on expertise in CompTIA Security+ certification exam with CompTIA Security+ performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CompTIA Security+ performance-based labs cover all the objectives of CompTIA Security+ SY0-401 exam which include the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and much more.

Here's what you will get

CompTIA Security+ is a standalone certification from CompTIA with the exam code SY0-401. This certification covers the most important principles for securing a network and managing risk. The CompTIA Network+ certification is recommended before taking the Security+ exam.  CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security.

Video tutorials
Exam FAQs
What are the prerequisites for this exam? CompTIA Network+ and two years of experience in IT administration with a focus on security.
What is the exam registration fee? USD 330 
Where do I take the exam? Pearson VUE
What is the format of the exam? The exam consists of multiple choice and performance-based questions.
How many questions are asked in the exam? The exam contains 90 questions.
What is the duration of the exam? 90 minutes
What is the passing score? 750

(on a scale of 100-900)

What is the exam's retake policy?

In the event that you fail your first attempt at passing the SY0-401 examination, CompTIA's retake policy is:

  1. CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least 14 calendar days from the date of your last attempt before you can retake the exam.
  2. If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  3. A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  4. Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
What is the validity of the certification? CompTIA Security+ certification expires after three years from the date of issue, after which the certification holder will need to renew their certification via CompTIA's Continuing Education Program.
Where can I find more information about this exam? To know more about the SY0-401-lab, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Security Architect
  • Security Engineer
  • Security Administrator
  • Systems Administrator
  • Network Administrator
  • Security Consultant/Specialist

Here's what you will learn

Hands on Activities (Labs)

  • Configuring NPS Accounting
  • Identifying types of firewall
  • Understanding the network infrastructure devices
  • Identifying Intrusion detection key terms
  • Understanding passive responses of intrusion
  • Understanding web-based applications
  • Identifying device for network connectivity
  • Identifying PBX system layers
  • Understanding router protocols
  • Identifying sequence in which the IDS instructs the TCP to reset connections
  • Understanding email protocols
  • Understanding the network devices
  • Configuring IE settings to avoid disruption in computer operations
  • Configuring the settings in Content Advisor
  • Configuring Windows firewall settings
  • Identifying primary areas of security topologies
  • Viewing the ARP table
  • Configuring NPS network policy
  • Identifying cloud computing service models
  • Understanding cloud models
  • Enabling LMHOSTS lookup
  • Identifying TCP/IP architecture layer protocols
  • Understanding application layer protocols
  • Understanding Internet layer protocols
  • Identifying protocols for secure connections
  • Understanding TCP/IP protocols
  • Identifying TCP ports
  • Identifying ports and services
  • Understanding protocols
  • Identifying the tunnel
  • Spotting the intranet network
  • Identifying wireless protocols
  • Understanding technologies used to communicate in the 802.11 standard
  • Understanding WAP security levels
  • Configuring wireless network settings
  • Understanding key areas of policy implementation
  • Viewing the current version of BIOS
  • Identifying risk actions
  • Identifying service associated with cloud computing
  • Identifying security factors
  • Identifying policies
  • Understanding measures of risk calculation
  • Viewing disk configuration
  • Identifying key aspects of standard documents
  • Understanding information categories
  • Identifying Information models
  • Identifying physical security devices
  • Identifying retardants of fire extinguishers
  • Identifying areas to consider for the business policy
  • Checking the integrity of messages through MAC values
  • Creating and backing up an encryption certificate
  • Identifying approaches of non-mathematical cryptography
  • Creating a virtual volume
  • Mounting and dismounting an encrypted volume
  • Backing up an encryption certificate and key
  • Identifying types of viruses
  • Identifying the filename extension
  • Identifying types of malware
  • Understanding classification of viruses
  • Understanding code-breaking techniques
  • Performing XArp software installation
  • Identifying types of system attack
  • Understanding types of application attacks
  • Identifying attacks
  • Preventing IP address spoofing
  • Identifying cryptographic attacks
  • Identifying authentication protocols
  • Identifying social engineering attacks
  • Determining vulnerability of a network to attacks
  • Viewing memory usage of programs
  • Understanding security posture methods
  • Understanding key areas of reporting
  • Viewing different event details
  • Viewing the running processes of all the users
  • Viewing details of an event in Windows Server
  • Working with a host-based IDS
  • Identifying causes of compromised security
  • Identifying technologies to create less vulnerable networks
  • Joining SpyNet community using Windows Defender
  • Identifying vulnerability scanning tasks
  • Scanning the computer
  • Protecting a computer by blocking communications
  • Downloading and installing the Avast antivirus, and scanning the system
  • Creating a new inbound rule
  • Blocking a connection
  • Performing penetration testing
  • Identifying measures for spamming protection
  • Identifying ethical hacking approaches
  • Understanding models for improving system performance
  • Identifying methods of updating an operating system
  • Downloading the Windows 7 service pack
  • Viewing the update history and details
  • Installing the FTP server under the Web Server role
  • Creating DNS domains
  • Understanding security measures for mobile devices
  • Understanding acts to ensure privacy of information
  • Understanding methods of OS hardening
  • Understanding evaluation assurance levels
  • Configuring pop-up blocker settings
  • Editing a virtual hard disk file
  • Understanding primary virtualization topics
  • Sharing a folder with a different user on a single computer
  • Configuring NPS to provide RADIUS authentication
  • Understanding LDAP names
  • Identifying authentication services
  • Identifying types of authentication services
  • Enabling the network policy server
  • Creating a network bridge
  • Creating a hash rule in Windows Server 2012
  • Identifying tunneling protocols
  • Viewing the Generate Random Password screenshot
  • Identifying access control methods
  • Customizing group and user access with MMC
  • Turning off the guest account
  • Configuring account time limits
  • Deleting the web browsing history
  • Identifying asymmetric algorithms
  • Encrypting and decrypting a message
  • Enabling BitLocker
  • Adding counters
  • Encrypting and decrypting a message using the RSA algorithm
  • Encrypting a picture
  • Identifying hashing algorithm
  • Understanding public cryptographic initiatives
  • Understanding PKCS standards
  • Installing the Web Server IIS server role
  • Managing the certificate server using the mmc tool
  • Adding the Active Directory Certificate Services role
  • Understanding trust models
  • Identifying the authority process
  • Examining certificate details
  • Examining the Microsoft Root Authority certificate details
  • Understanding PKI trust models
  • Installing a subordinate Certification Authority