SY0-301 Part 2

Beschreibung

Questions 51-100
Brooks Thornhill
Quiz von Brooks Thornhill, aktualisiert more than 1 year ago
Brooks Thornhill
Erstellt von Brooks Thornhill vor fast 8 Jahre
19
0

Zusammenfassung der Ressource

Frage 1

Frage
Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of data making it susceptible to brute force attacks?
Antworten
  • PAP
  • NTLMv2
  • LANMAN
  • CHAP

Frage 2

Frage
Which of the following should be used to help prevent device theft of unused assets?
Antworten
  • HSM device
  • Locking cabinet
  • Device encryption
  • GPS tracking

Frage 3

Frage
Which of the following security practices should occur initially in software development?
Antworten
  • Secure code review
  • Patch management
  • Fuzzing
  • Penetration tests

Frage 4

Frage
Which of the following uses tickets to identify users to the network?
Antworten
  • RADIUS
  • LDAP
  • TACACS+
  • Kerberos

Frage 5

Frage
Which of the following file transfer protocols is an extension of SSH Protocol Version 2.0?
Antworten
  • FTP
  • TFTP
  • SFTP
  • FTPS

Frage 6

Frage
Due to sensitive data concerns, a security administrator has enacted a policy preventing the use of flash drives. Additionally, which of the following can the administrator implement to reduce the risk of data leakage?
Antworten
  • Enact a policy that all work files are to be password protected
  • Enact a policy banning users from bringing in personal music devices
  • Provide users with unencrypted storage devices that remain on-site
  • Disallow users from saving data to any network share

Frage 7

Frage
The security administrator implemented privacy screens, password protected screen savers, and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate? (Select TWO).
Antworten
  • Whaling
  • Dumpster diving
  • Shoulder surfing
  • Tailgating
  • Impersonation

Frage 8

Frage
Performing routine security audits is a form of which of the following controls?
Antworten
  • Preventive
  • Detective
  • Protective
  • Proactive

Frage 9

Frage
Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Antworten
  • LDAP injection
  • SQL injection
  • Error and exception handling
  • Cross-site scripting

Frage 10

Frage
Which of the following access control technologies provides a rolling password for one-time use?
Antworten
  • RSA tokens
  • ACL
  • Multifactor authentication
  • PIV card

Frage 11

Frage
Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Antworten
  • Document scan results for the change control board
  • Organize data based on severity and asset value
  • Examine the vulnerability data using a network analyzer
  • Update antivirus signatures and apply patches

Frage 12

Frage
Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
Antworten
  • ARP poisoning
  • MAC spoofing
  • pWWN spoofing
  • DNS poisoning

Frage 13

Frage
Which of the following devices would be installed on a single computer to prevent intrusion?
Antworten
  • Host intrusion detection
  • Network firewall
  • Host-based firewall
  • VPN concentrator

Frage 14

Frage
Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Antworten
  • Password behaviors
  • Clean desk policy
  • Data handling
  • Data disposal

Frage 15

Frage
A penetration test shows that almost all database servers were able to be compromised through a default database user account with the default password. Which of the following is MOST likely missing from the operational procedures?
Antworten
  • Application hardening
  • OS hardening
  • Application patch management
  • SQL injection

Frage 16

Frage
Isolation mode on an AP provides which of the following functionality types?
Antworten
  • Segmentation of each wireless user from other wireless users
  • Disallows all users from communicating directly with the AP
  • Hides the service set identifier
  • Makes the router invisible to other routers

Frage 17

Frage
Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
Antworten
  • SSH
  • SCP
  • SFTP
  • SNMP

Frage 18

Frage
Which of the following is MOST likely to be the last rule contained on any firewall?
Antworten
  • IP allow any any
  • Implicit deny
  • Separation of duties
  • Time of day restrictions

Frage 19

Frage
During the analysis of malicious code, a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Antworten
  • Buffer overflow
  • XML injection
  • SQL injection
  • Distributed denial of service

Frage 20

Frage
Which of the following is true about hardware encryption? (Select TWO).
Antworten
  • It must use elliptical curve encryption
  • It requires a HSM file system
  • It only works when data is not highly fragmented
  • It is faster than software encryption
  • It is available on computers using TPM

Frage 21

Frage
Which of the following is an example of verifying new software changes on a test system?
Antworten
  • User access control
  • Patch management
  • Intrusion prevention
  • Application hardening

Frage 22

Frage
Which of the following is a technical control?
Antworten
  • System security categorization requirement
  • Baseline configuration development
  • Contingency planning
  • Least privilege implementation

Frage 23

Frage
Public keys are used for which of the following?
Antworten
  • Decrypting wireless messages
  • Decrypting the hash of an electronic signature
  • Bulk encryption of IP based email traffic
  • Encrypting web browser traffic

Frage 24

Frage
Which of the following penetration testing types is performed by security professionals with limited inside knowledge of the network?
Antworten
  • Passive vulnerability scan
  • Gray box
  • White box
  • Black box

Frage 25

Frage
Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
Antworten
  • Spam filter
  • IDS
  • Firewall
  • Malware inspection

Frage 26

Frage
Which of the following cloud computing concepts is BEST described as providing an Operating System on which the customer can install your own applications or software on-demand ?
Antworten
  • Platform as a Service
  • Software as a Service
  • Infrastructure as a Service
  • Trusted OS as a Service

Frage 27

Frage
A security administrator wants to prevent users in sales from accessing their servers after 6:00 p.m., and prevent them from accessing accounting's network at all times. Which of the following should the administrator implement to accomplish these goals? (Select TWO).
Antworten
  • Separation of duties
  • Time of day restrictions
  • Access control lists
  • Mandatory access control
  • Single sign-on

Frage 28

Frage
Which of the following environmental controls would BEST be used to regulate cooling and flow of air within a datacenter?
Antworten
  • Fire suppression
  • Video monitoring
  • EMI shielding
  • Hot and cold aisles

Frage 29

Frage
Which of the following is used when performing a quantitative risk analysis?
Antworten
  • Focus groups
  • Asset value
  • Surveys
  • Best practice

Frage 30

Frage
Which of the following BEST describes the function of TPM?
Antworten
  • High speed secure removable storage device
  • Third party certificate trust authority
  • Hardware chip that stores encryption keys
  • A trusted OS model

Frage 31

Frage
Which of the following PKI implementation element is responsible for verifying the authenticity of certificate contents?
Antworten
  • CRL
  • Key escrow
  • Recovery agent
  • CA

Frage 32

Frage
Which of the following describes an active attempt to identify weaknesses?
Antworten
  • Vulnerability scanning
  • Zero day attack
  • Port scanning
  • Penetration testing

Frage 33

Frage
The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffic on the network. Which of the following is the MOST likely cause?
Antworten
  • NIPS is blocking activities from those specific websites
  • NIDS is blocking activities from those specific websites
  • The firewall is blocking web activity
  • The router is denying all traffic from those sites

Frage 34

Frage
Which of the following should be enabled to ensure only certain wireless clients can access the network?
Antworten
  • DHCP
  • SSID broadcast
  • MAC filtering
  • AP isolation

Frage 35

Frage
Which of the following is the BEST standard for encryption on a wireless network?
Antworten
  • WPA2-PSK
  • AES
  • WPA
  • WEP

Frage 36

Frage
Which of the following would you educate your employees about in order to prevent them to become victim of an attacker attempting to obtain bank account information?
Antworten
  • Password complexity requirements
  • Phishing techniques
  • Handling PII
  • Tailgating techniques

Frage 37

Frage
If a user wishes to receive a file encrypted with PGP, the user must FIRST supply which of the following to the person who wishes to securely send the file:
Antworten
  • public key
  • recovery agent
  • key escrow account
  • private key

Frage 38

Frage
Which of the following is a reason to perform a penetration test?
Antworten
  • To passively test security controls within the enterprise
  • To provide training to white hat attackers
  • To identify all vulnerabilities and weaknesses within the enterprise
  • To determine the potential impact of a threat against the enterprise

Frage 39

Frage
Which of the following methods BEST describes the use of hiding data within other files?
Antworten
  • Digital signatures
  • PKI
  • Transport encryption
  • Steganography

Frage 40

Frage
Which of the following BEST describes the proper method and reason to implement port security?
Antworten
  • Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network
  • Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network
  • Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network
  • Apply a security control which ties specific ports to end-device IP addresses and prevents mobile devices from being connected to the network

Frage 41

Frage
Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Antworten
  • Exception handling
  • Adware
  • Cross-site request forgery
  • Cross-site scripting

Frage 42

Frage
Which of the following is MOST likely to result in a data loss or compromise?
Antworten
  • Accounting transferring confidential staff details via SFTP to the payroll department
  • Back office staff accessing and updating details on the mainframe via SSH
  • Encrypted backup tapes left unattended at reception for offsite storage
  • Developers copying data from production to the test environments via a USB stick

Frage 43

Frage
A security administrator has discovered through a password auditing software that most passwords can be discovered by cracking the first seven characters and then cracking the second part of the password. Which of the following is in use by the company?
Antworten
  • LANMAN
  • MD5
  • WEP
  • 3DES

Frage 44

Frage
Which of the following concepts ensures that the data is only viewable to authorized users?
Antworten
  • Availability
  • Biometrics
  • Integrity
  • Confidentiality

Frage 45

Frage
Which of the following BEST describes an intrusion prevention system?
Antworten
  • A system that stops an attack in progress
  • A system that allows an attack to be identified
  • A system that logs the attack for later analysis
  • A system that serves as a honeypot

Frage 46

Frage
A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last month. Which of the following is MOST likely causing the disconnections?
Antworten
  • An attacker inside the company is performing a bluejacking attack on the user's laptop
  • Another user's Bluetooth device is causing interference with the Bluetooth on the laptop
  • The new access point was mis-configured and is interfering with another nearby access point
  • The attacker that breached the nearby company is in the parking lot implementing a war driving attack

Frage 47

Frage
Risk can be managed in the following ways EXCEPT:
Antworten
  • mitigation
  • acceptance
  • elimination
  • transference

Frage 48

Frage
A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Antworten
  • Change the server's SSL key and add the previous key to the CRL
  • Install a host-based firewall
  • Install missing security updates for the operating system
  • Add input validation to forms

Frage 49

Frage
While browsing the Internet, an administrator notices their browser behaves erratically, appears to download something, and then crashes. Upon restarting the PC, the administrator notices performance is extremely slow and there are hundreds of outbound connections to various websites. Which of the following BEST describes what has occurred?
Antworten
  • The PC has become part of a botnet
  • The PC has become infected with spyware
  • The PC has become a spam host
  • The PC has become infected with adware

Frage 50

Frage
Which of the following is a best practice when securing a switch from physical access?
Antworten
  • Disable unnecessary accounts
  • Print baseline configuration
  • Enable access lists
  • Disable unused ports
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Chemische Grundlagen-Auffrischung
anna garcias
Streitstände - Strafecht
myJurazone
Analysis - Abiturvorbereitung Mathe
c.aciksoez
Pädagogik: Lernvokabeln zu Jean Piaget
Lena S.
Ökologie
Zami I.
EVA - Vorbereitung MC Teil
hans urst
Kommunikationssoziologie (KSOZ) Grimm 2017/18
Benedikt Zöchling
Vetie: Virofragen 2016
Johanna Tr
Steop Meko Fragen
Adrienne Tschaudi
Vetie Radiologie 2019
Anna Nie
Vetie: Milch 2020 Matrikel 14
Johanna Tr