Brooks Thornhill
Quiz von , erstellt am more than 1 year ago

CISSP (Brooks) (SY0-201) Quiz am SY0-201 Part 3, erstellt von Brooks Thornhill am 15/08/2016.

8
0
0
Brooks Thornhill
Erstellt von Brooks Thornhill vor fast 8 Jahre
Schließen

SY0-201 Part 3

Frage 1 von 48

1

Which of the following is a goal of penetration testing?

Wähle eine der folgenden:

  • Passively assess web vulnerabilities

  • To check compliance of the router configuration

  • Provide a passive check of the networks security

  • Actively assess deployed security controls

Erklärung

Frage 2 von 48

1

Using a smartcard and a physical token is considered how many factors of authentication?

Wähle eine der folgenden:

  • One

  • Two

  • Three

  • Four

Erklärung

Frage 3 von 48

1

Which of the following increases availability during periods of electromagnetic interference? (Select
TWO)

Wähle eine oder mehr der folgenden:

  • Fiber optic cable

  • Straight-through cable

  • STP cable

  • Crossover cable

  • UTP cable

Erklärung

Frage 4 von 48

1

A computer is displaying an MBR error upon restart. The technician is told the user has just installed
new software. Which of the following threats is the MOST likely cause of this error?

Wähle eine der folgenden:

  • Distributed DoS

  • Boot sector virus

  • ActiveX

  • Trojan

Erklärung

Frage 5 von 48

1

Which of the following should be disabled to help prevent boot sector viruses from launching when a
computer boots?

Wähle eine der folgenden:

  • SNMP

  • DMZ

  • USB

  • Hard Drive

Erklärung

Frage 6 von 48

1

Which of the following video surveillance systems should be installed on an existing network?

Wähle eine der folgenden:

  • Microwave

  • Analog

  • CCTV

  • IP

Erklärung

Frage 7 von 48

1

Which of the following has a 128-bit message digest?

Wähle eine der folgenden:

  • NTLM

  • MD5

  • SHA

  • 3DES

Erklärung

Frage 8 von 48

1

Which of the following is commonly used to secure HTTP and SMTP traffic?

Wähle eine der folgenden:

  • SHA

  • SFTP

  • TLS

  • SCP

Erklärung

Frage 9 von 48

1

Which of the following uses an RC4 key that can be discovered by eavesdropping on plain text
initialization vectors?

Wähle eine der folgenden:

  • WEP

  • TKIP

  • SSH

  • WPA

Erklärung

Frage 10 von 48

1

A retinal scanner provides which of the following authentication types?

Wähle eine der folgenden:

  • Biometric

  • Token

  • Two-factor

  • Optic

Erklärung

Frage 11 von 48

1

The accounting group, clinical group and operations group only have access to their own applications.
The company often needs auditors to have access to all three groups applications with little notice. Which
of the following would simplify the process of granting auditors permissions to all the applications?

Wähle eine der folgenden:

  • Create an auditors group and merge the members of the accounting, clinical and operations groups

  • Create an auditors group and add each user to the accounting, clinical and operations groups
    individually

  • Create an auditors group and add each of the accounting, clinical and operations groups to the auditors group

  • Create an auditors group and add the group to each of the accounting, clinical and operations groups

Erklärung

Frage 12 von 48

1

Which of the following utilities would allow a system administrator to discover why an ISP is generating
a large amount of TCP RST packets?

Wähle eine der folgenden:

  • L0phtcrack

  • Wireshark

  • Nmap

  • Nessus

Erklärung

Frage 13 von 48

1

A large amount of continuous small transmissions are originating from multiple external hosts to the
corporate web server, which is also inaccessible to users. Which of the following attacks is MOST likely the
cause?

Wähle eine der folgenden:

  • Spoofing

  • DNS poisoning

  • DDoS

  • DoS

Erklärung

Frage 14 von 48

1

A network security administrator is worried about potential man-in-the-middle attacks against users
when they access a corporate website from their workstations. Which of the following is the BEST
mitigation against this type of attack?

Wähle eine der folgenden:

  • Implementing server-side PKI certificates for all connections

  • Mandating only client-side PKI certificates for all connections

  • Requiring client and server PKI certificates for all connections

  • Requiring strong authentication for all DNS queries

Erklärung

Frage 15 von 48

1

The security administrator at a small company is having trouble sending and receiving SMTP traffic
from the network to the external gateway. Network utilization is very high with most traffic originating at one
external IP address and ending at the SMTP server. Which of the following is MOST likely happening?

Wähle eine der folgenden:

  • DoS attack

  • Open mail relays

  • Distributed DoS attack

  • Spear-phishing

Erklärung

Frage 16 von 48

1

The last company administrator failed to renew the registration for the corporate web site (e.g.
https://www.comptia.org). When the new administrator tried to register the website it is discovered that the
registration is being held by a series of small companies for very short periods of time. This is typical of
which of the following?

Wähle eine der folgenden:

  • Spoofing

  • TCP/IP hijacking

  • Domain name kiting

  • DNS poisoning

Erklärung

Frage 17 von 48

1

When used to encrypt transmissions, which of the following is the MOST resistant to brute force attacks?

Wähle eine der folgenden:

  • SHA

  • MD5

  • 3DES

  • AES256

Erklärung

Frage 18 von 48

1

Which of the following is the BEST choice for whole disk encryption when confidentiality is the primary
concern?

Wähle eine der folgenden:

  • PGP

  • 3DES

  • DES

  • AES

Erklärung

Frage 19 von 48

1

The primary purpose of a hot site is to ensure which of the following?

Wähle eine der folgenden:

  • Adequate HVAC to meet environmental initiatives

  • Recovery of operations within 30 days after a disaster

  • Transition of operations in a short time period in a disaster

  • Seamless operations in the event of a disaster

Erklärung

Frage 20 von 48

1

Which of the following is a component of a disaster recovery plan for a company that expects a site to
be rendered non-usable during a disaster and needs a nearly transparent transfer of operations?

Wähle eine der folgenden:

  • Warm site

  • Cold site

  • Hot site

  • Alternate site

Erklärung

Frage 21 von 48

1

Which of the following is the BEST mitigation method to implement when protecting against a
discovered OS exploit?

Wähle eine der folgenden:

  • NIDS

  • Patch

  • Antivirus update

  • HIDS

Erklärung

Frage 22 von 48

1

Which of the following MUST be taken into account when conducting risk assessments on necessary
systems that are very old, costly to maintain, and very difficult to upgrade?

Wähle eine der folgenden:

  • Likelihood vulnerability will be exploited

  • Frequency of patches published by the developer

  • Likelihood an attacker will notice the system

  • Maintenance costs associated with the system

Erklärung

Frage 23 von 48

1

Implicit deny is the practice of setting ACLs to which of the following conditions?

Wähle eine der folgenden:

  • Verify all IP packets

  • Not allow by default

  • Transfer all traffic

  • Not allow by exception

Erklärung

Frage 24 von 48

1

Which of the following can virtualization technology provide with respect to availability?

Wähle eine der folgenden:

  • The capability to manually transition hosts as hardware is added

  • The capacity to deploy more encrypted guests than hardware allows

  • The capability to automatically transition guests as hardware fails

  • The ability to provision more services during off peak hours

Erklärung

Frage 25 von 48

1

Which of the following is made possible by some commercial virtualization hosting applications?

Wähle eine der folgenden:

  • Automatic redundancy for power in the event of a blackout

  • Seamless switching between telephony and IP telephony

  • Automatic transfer of applications when hardware fails

  • Transfer of network infrastructure components to meet demand

Erklärung

Frage 26 von 48

1

Cell phones with network access and the ability to store data files are susceptible to which of the
following risks?

Wähle eine der folgenden:

  • Input validation errors

  • SMTP open relays

  • Viruses

  • Logic bombs

Erklärung

Frage 27 von 48

1

If an administrator wanted to gather information about the tools and techniques used by attackers,
which of the following could be used?

Wähle eine der folgenden:

  • VLANs

  • Honeypot

  • Back door

  • Firewall

Erklärung

Frage 28 von 48

1

Shielded communications media is MOST often used to prevent electrical emanations from being
detected and crosstalk between which of the following?

Wähle eine der folgenden:

  • Networks

  • Cables

  • VLANs

  • VPNs

Erklärung

Frage 29 von 48

1

To prevent unintentional DoS, which of the following should network users be restricted from doing?

Wähle eine der folgenden:

  • Printing to non-local printers

  • Restarting their own print jobs

  • Installing print management software

  • Deleting jobs from the print queue

Erklärung

Frage 30 von 48

1

Which of the following would a network administrator implement to control traffic being routed between
networks or network segments in an effort to preserve data confidentiality?

Wähle eine der folgenden:

  • NAT

  • Group policies

  • Password policies

  • ACLs

Erklärung

Frage 31 von 48

1

An employee reports that while at the airport an unknown user was taking pictures of the employees
screen. This is commonly known as which of the following?

Wähle eine der folgenden:

  • Shoulder surfing

  • Phishing

  • Spyware

  • Dumpster diving

Erklärung

Frage 32 von 48

1

The director of finance is worried about information being seen while working on a laptop at the local
coffee shop. Which of the following can be used to avoid shoulder surfing?

Wähle eine der folgenden:

  • Spyware

  • Antivirus

  • Privacy screen

  • Spam

Erklärung

Frage 33 von 48

1

A user needs to send bank account information to the Human Resource department for payroll. This
type of information is considered which of the following?

Wähle eine der folgenden:

  • Due care

  • Personally identifiable information

  • Due process

  • Classification of information

Erklärung

Frage 34 von 48

1

A user wants to send personally identifiable information to the security office via email, so they can
perform a background check. Which of the following should be used to send the information to the security
office?

Wähle eine der folgenden:

  • Level of importance

  • Digital signature

  • Encryption

  • Signature line

Erklärung

Frage 35 von 48

1

A security administrator wants to prevent employees from sending unencrypted email with proprietary
information. Which of the following can help mitigate this type of problem?

Wähle eine der folgenden:

  • User awareness training

  • Dumpster diving

  • Personally identifiable information

  • Change management policy

Erklärung

Frage 36 von 48

1

A technician needs to setup a secure room to enable a private VTC system. Which of the following
should be installed to prevent devices from listening to the VTC?

Wähle eine der folgenden:

  • Shielding

  • HIDS

  • HVAC

  • MD5 hashing

Erklärung

Frage 37 von 48

1

A user reports that the workstation is going to obscure websites unexpectedly. Which of the following
should a first responder do when arriving at the workstation?

Wähle eine der folgenden:

  • Record the findings

  • Shutdown the workstation

  • Format the hard drive

  • Upgrade the operating system

Erklärung

Frage 38 von 48

1

A technician is setting up a secure laptop and wants to ensure that every log is captured for later
evaluation. In which of the following locations would this information need to be noted?

Wähle eine der folgenden:

  • Disaster recovery plan

  • Retention policy

  • Group policy

  • User review

Erklärung

Frage 39 von 48

1

The president of the company is trying to get to their banks website, and the browser is displaying that
the webpage is being blocked by the system administrator.Which of the following logs would the technician
review?

Wähle eine der folgenden:

  • DNS

  • Performance

  • System

  • Content filter

Erklärung

Frage 40 von 48

1

A user reports that the spreadsheet they use for the department will not open. The spreadsheet is
located on a server that was recently patched. Which of the following logs would the technician review
FIRST?

Wähle eine der folgenden:

  • Access

  • Firewall

  • Antivirus

  • DNS

Erklärung

Frage 41 von 48

1

Which of the following allows a users private IP address to be displayed as the firewall IP address
when browsing the Internet?

Wähle eine der folgenden:

  • Screened subnet

  • Dual-homed

  • DHCP

  • NAT

Erklärung

Frage 42 von 48

1

A user reports that each time they attempt to go to a legitimate website, they are sent to an
inappropriate website. The security administrator suspects the user may have malware on the computer,
which manipulated some of the users files. Which of the following files on the users system would need to
be checked for unauthorized changes?

Wähle eine der folgenden:

  • SAM

  • LMhosts

  • Services

  • Hosts

Erklärung

Frage 43 von 48

1

A security administrator responds to a report of a web server that has been compromised. The security
administrator observes the background has been changed to an image of an attacker group. Which of the
following would be the FIRST step in the incident response process?

Wähle eine der folgenden:

  • Run an antivirus scan

  • Disable the network connection

  • Power down the server

  • Print a copy of the background

Erklärung

Frage 44 von 48

1

While responding to a confirmed breach of the organizations web server, the security administrator
determines the source of the attack was from a rival organizations IP address range.Which of the following
should the security administer do with this information?

Wähle eine der folgenden:

  • Notify the Help Desk

  • Notify ICANN

  • Notify management

  • Notify the rival organizations IT department

Erklärung

Frage 45 von 48

1

Which of the following organizational disaster recovery types would provide a building and network
equipment but not current application data?

Wähle eine der folgenden:

  • Warm site

  • Field site

  • Cold site

  • Hot site

Erklärung

Frage 46 von 48

1

A security administrator is installing a new NIDS. For the NIDS to view all of the available traffic on a
given segment, which of the following must the network administrator configure on the switch?

Wähle eine der folgenden:

  • VLAN

  • Mirrored port

  • NAT

  • Management interface

Erklärung

Frage 47 von 48

1

Which of the following solutions will allow a security administrator to implement a white list of
applications authorized on a users PC?

Wähle eine der folgenden:

  • Antivirus

  • HIPS

  • HIDS

  • Anti-spam

Erklärung

Frage 48 von 48

1

Which of the following is an authentication method that uses symmetric key encryption and a key
distribution center?

Wähle eine der folgenden:

  • MS-CHAP

  • Kerberos

  • 802.1x

  • EAP

Erklärung