SY0-301 Part 4

Description

Questions 151 - 200
Brooks Thornhill
Quiz by Brooks Thornhill, updated more than 1 year ago
Brooks Thornhill
Created by Brooks Thornhill over 7 years ago
32
0

Resource summary

Question 1

Question
An administrator wants to setup their network with only one public IP address even thou there are 10 users internally who needs access. Which of the following would allow for this?
Answer
  • DMZ
  • VLAN
  • NIDS
  • NAT

Question 2

Question
Which of the following would be the MOST secure choice to implement for authenticating remote connections?
Answer
  • LDAP
  • 802.1x
  • RAS
  • RADIUS

Question 3

Question
Which of the following is the BEST way to reduce the number of passwords a user must remember and maintain?
Answer
  • Kerberos
  • CHAP
  • SSO
  • MD5

Question 4

Question
Which of the following can be used as a means for dual-factor authentication?
Answer
  • RAS and username/password
  • RADIUS and L2TP
  • LDAP and WPA
  • Iris scan and proximity card

Question 5

Question
Which of the following type of attacks requires an attacker to sniff the network?
Answer
  • Man-in-the-Middle
  • DDoS attack
  • MAC flooding
  • DNS poisoning

Question 6

Question
Which of the following redundancy solutions contains hardware systems similar to the affected organization, but does not provide all of the equipment needed for redundancy?
Answer
  • Hot site
  • Uninterruptible Power Supply (UPS)
  • Warm site
  • Cold site

Question 7

Question
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?
Answer
  • The cell phone should require a password after a set period of inactivity
  • The cell phone should only be used for company related emails
  • The cell phone data should be encrypted according to NIST standards
  • The cell phone should have data connection abilities disabled

Question 8

Question
Which of the following algorithms is the LEAST secure?
Answer
  • NTLM
  • MD5
  • LANMAN
  • SHA-1

Question 9

Question
A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
Answer
  • Protocol analyzer
  • Bluesnarfing
  • Host routing table
  • HIDS

Question 10

Question
Which of the following is an example of security personnel that administer access control functions, but do not administer audit functions?
Answer
  • Access enforcement
  • Separation of duties
  • Least privilege
  • Account management

Question 11

Question
Which of the following is used to perform denial of service (DoS) attacks?
Answer
  • Privilege escalation
  • Botnet
  • Adware
  • Spyware

Question 12

Question
Which of the following is an exploit against a device where only the hardware model and manufacturer are known?
Answer
  • Replay attack
  • Denial of service (DoS)
  • Privilege escalation
  • Default passwords

Question 13

Question
Which of the following tools will allow the technician to find all open ports on the network?
Answer
  • Performance monitor
  • Protocol analyzer
  • Router ACL
  • Network scanner

Question 14

Question
Which of the following should a technician recommend to prevent physical access to individual office areas? (Select TWO).
Answer
  • Video surveillance
  • Blockade
  • Key card readers
  • Mantrap
  • Perimeter fence

Question 15

Question
After issuance a technician becomes aware that some asymmetric keys were issued to individuals who are not authorized to use them. Which of the following should the technician use to revoke the keys and informs others they are no longer trusted?
Answer
  • Recovery agent
  • Certificate revocation list
  • Key escrow
  • Public key recovery

Question 16

Question
Which of following can BEST be used to determine the topology of a network and discover unknown devices?
Answer
  • Vulnerability scanner
  • NIPS
  • Protocol analyzer
  • Network mapper

Question 17

Question
Which of the following BEST describes the term war driving?
Answer
  • Driving from point to point with a laptop and an antenna to find unsecured wireless access points
  • Driving from point to point with a wireless scanner to read other user emails through the access point
  • Driving from point to point with a wireless network card and hacking into unsecured wireless access points
  • Driving from point to point with a wireless scanner to use unsecured access points

Question 18

Question
When is the BEST time to update antivirus definitions?
Answer
  • At least once a week as part of system maintenance
  • As the definitions become available from the vendor
  • When a new virus is discovered on the system
  • When an attack occurs on the network

Question 19

Question
Why would a technician use a password cracker?
Answer
  • To look for weak passwords on the network
  • To change a user passwords when they leave the company
  • To enforce password complexity requirements
  • To change user passwords if they have forgotten them

Question 20

Question
What would be a requirement before a technician begin his penetration test?
Answer
  • When the technician suspects that weak passwords exist on the network
  • When the technician is trying to guess passwords on a network
  • When the technician has permission from the owner of the network
  • When the technician is war driving and trying to gain access

Question 21

Question
Which of the following is the MOST secure alternative for remote administrative access to a router?
Answer
  • SSH
  • Telnet
  • rlogin
  • HTTP

Question 22

Question
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).
Answer
  • Disable the USB root hub within the OS
  • Install anti-virus software on the USB drives
  • Disable USB within the workstation BIOS
  • Apply the concept of least privilege to USB devices
  • Run spyware detection against all workstations

Question 23

Question
A technician is testing the security of a new database application with a website front-end. The technician notices that when certain characters are input into the application it will crash the server. Which of the following does the technician need to do?
Answer
  • Utilize SSL on the website
  • Implement an ACL
  • Lock-down the database
  • Input validation

Question 24

Question
An administrator in a small office environment has implemented an IDS on the network perimeter to detect malicious traffic patterns. The administrator still has a concern about traffic inside the network originating between client workstations. Which of the following could be implemented?
Answer
  • HIDS
  • A VLAN
  • A network router
  • An access list

Question 25

Question
Which of the following is the primary purpose of a CA?
Answer
  • LANMAN validation
  • Encrypt data
  • Kerberos authentication
  • Issue private/public keys

Question 26

Question
A user is attempting to receive digitally signed and encrypted email messages from a remote office. Which of the following protocols does the system need to support?
Answer
  • SMTP
  • S/MIME
  • ISAKMP
  • IPSec

Question 27

Question
Antivirus software products detect malware by comparing the characteristics of known instances against which of the following type of file sets?
Answer
  • Signature
  • Text
  • NIDS signature
  • Dynamic Library

Question 28

Question
Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?
Answer
  • Rogue access points
  • War driving
  • Weak encryption
  • Session hijacking

Question 29

Question
An administrator notices that former temporary employee's accounts are still active on a domain. Which of the following can be implemented to increase security and prevent this from happening?
Answer
  • Run a last logon script to look for inactive accounts
  • Implement an account expiration date for temporary employees
  • Implement a password expiration policy
  • Implement time of day restrictions for all temporary employees

Question 30

Question
Which of the following algorithms have the smallest key space?
Answer
  • IDEA
  • SHA-1
  • AES
  • DES

Question 31

Question
Which of the following is the MOST recent addition to cryptography as a standard for the US Government?
Answer
  • AES
  • DES
  • 3DES
  • PGP

Question 32

Question
Which of the following allows for notification when a hacking attempt is discovered?
Answer
  • NAT
  • NIDS
  • Netflow
  • Protocol analyzer

Question 33

Question
When dealing with a 10BASE5 network, which of the following is the MOST likely security risk?
Answer
  • An incorrect VLAN
  • SSID broadcasting
  • A repeater
  • A vampire tap

Question 34

Question
Which of the following allows a technician to scan for missing patches on a device without actually attempting to exploit the security problem?
Answer
  • A vulnerability scanner
  • Security baselines
  • A port scanner
  • Group policy

Question 35

Question
Which of the following uses a key ring?
Answer
  • AES
  • DES
  • PGP
  • RSA

Question 36

Question
Using an asymmetric key cryptography system, where can a technician get a third party to vouch for the identity of the key pairs generated?
Answer
  • A certificate authority
  • IETF
  • A key escrow service
  • A recovery agent

Question 37

Question
Which of the following allows a file to have different security permissions for users that have the same roles or user groups?
Answer
  • Mandatory Access Control (MAC)
  • Role-Based Access Control (RBAC)
  • Discretionary Access Control (DAC)
  • Rule-Based Access Control (RBAC)

Question 38

Question
Which of the following would be BEST to use to apply corporate security settings to a device?
Answer
  • A security patch
  • A security hotfix
  • An OS service pack
  • A security template

Question 39

Question
A technician suspects that one of the network cards on the internal LAN is causing a broadcast storm. Which of the following would BEST diagnose which NIC is causing this problem?
Answer
  • The NIDS log file
  • A protocol analyzer
  • The local security log file
  • The local firewall log file

Question 40

Question
A CEO is concerned about staff browsing inappropriate material on the Internet via HTTPS. It has been suggested that the company purchase a product which could decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. Which of the following type of attacks is similar to this product?
Answer
  • Replay
  • Spoofing
  • TCP/IP hijacking
  • Man-in-the-middle

Question 41

Question
After a system risk assessment was performed it was found that the cost to mitigate the risk was higher than the expected loss if the risk was actualized. In this instance, which of the following is the BEST course of action?
Answer
  • Accept the risk
  • Mitigate the risk
  • Reject the risk
  • Run a new risk assessment

Question 42

Question
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of 5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If determining the risk, which of the following is the annual loss expectancy (ALE)?
Answer
  • $2,700
  • $4,500
  • $8,100
  • $7,290

Question 43

Question
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of 5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If the anti-malware software is purchased, which of the following is the expected net savings?
Answer
  • 9000
  • 2,290
  • 2,700
  • 5,000

Question 44

Question
A flat or simple role-based access control (RBAC) embodies which of the following principles?
Answer
  • Users assigned to roles, permissions are assigned to groups, controls applied to groups and permissions acquired by controls
  • Users assigned permissions, roles assigned to groups and users acquire additional permissions by being a member of a group
  • Roles applied to groups, users assigned to groups and users acquire permissions by being a member of the group
  • Users assigned to roles, permissions are assigned to roles and users acquire permissions by being a member of the role?

Question 45

Question
Frequent signature updates are required by which of the following security applications? (Select TWO).
Answer
  • Antivirus
  • PGP
  • Firewall
  • PKI
  • IDS

Question 46

Question
Social engineering, password cracking and vulnerability exploitation are examples of which of the following?
Answer
  • Vulnerability assessment
  • Fingerprinting
  • Penetration testing
  • Fuzzing

Question 47

Question
Configuration baselines should be taken at which of the following stages in the deployment of a new system?
Answer
  • Before initial configuration
  • Before loading the OS
  • After a user logs in
  • After initial configuration

Question 48

Question
Which of the following describes the difference between a secure cipher and a secure hash?
Answer
  • A hash produces a variable output for any input size, a cipher does not
  • A cipher produces the same size output for any input size, a hash does not
  • A cipher can be reversed, a hash cannot
  • A hash can be reversed, a cipher cannot

Question 49

Question
To evaluate the security compliance of a group of servers against best practices, which of the following BEST applies?
Answer
  • Get a patch management report
  • Conduct a penetration test
  • Run a vulnerability assessment tool
  • Install a protocol analyzer

Question 50

Question
Which of the following is a problem MOST often associated with UTP cable?
Answer
  • Fuzzing
  • Vampire tap
  • Crosstalk
  • Refraction
Show full summary Hide full summary

Similar

LOGARITHMS
pelumi opabisi
Conceptos Generales De Robótica
fede ramos
History - Medicine through Time
Alice Love
Of Mice and Men - Themes
Hafsa A
Geography: Population
ameliaalice
4 Lesson Planning Tips for Teachers
Micheal Heffernan
Using GoConqr to teach science
Sarah Egan
Introduction to the Atom
Derek Cumberbatch
New English Literature GCSE
Sarah Egan
AAHI_Card set 5 (Vital sign terminology)
Tafe Teachers SB
Cuadro sinóptico de la función de la planeación
Elliot Anderson