Brooks Thornhill
Quiz von , erstellt am more than 1 year ago

Questions 101- 150

19
0
0
Brooks Thornhill
Erstellt von Brooks Thornhill vor fast 8 Jahre
Schließen

SY0-301 Part 3

Frage 1 von 50

1

A security administrator is asked to email an employee their password. Which of the following account policies
MUST be set to ensure the employee changes their password promptly?

Wähle eine der folgenden:

  • Password expiration

  • Account lockout

  • Password recovery

  • Account enablement

Erklärung

Frage 2 von 50

1

Which of the following is the BEST way to mitigate data loss if a portable device is compromised?

Wähle eine der folgenden:

  • Full disk encryption

  • Common access card

  • Strong password complexity

  • Biometric authentication

Erklärung

Frage 3 von 50

1

Data can potentially be stolen from a disk encrypted, screen-lock protected, smartphone by which of the
following?

Wähle eine der folgenden:

  • Bluesnarfing

  • IV attack

  • Honeynet

  • SIM cloning

Erklärung

Frage 4 von 50

1

A purpose of LDAP authentication services is:

Wähle eine der folgenden:

  • to implement mandatory access controls

  • a single point of user management

  • to prevent multifactor authentication

  • to issue one-time hashed passwords

Erklärung

Frage 5 von 50

1

Which of the following allows an attacker to identify vulnerabilities within a closed source software application?

Wähle eine der folgenden:

  • Fuzzing

  • Compiling

  • Code reviews

  • Vulnerability scanning

Erklärung

Frage 6 von 50

1

Which of the following should the security administrator look at FIRST when implementing an AP to gain more
coverage?

Wähle eine der folgenden:

  • Encryption methods

  • Power levels

  • SSID

  • Radio frequency

Erklärung

Frage 7 von 50

1

Which of the following elements of PKI are found in a browser's trusted root CA?

Wähle eine der folgenden:

  • Private key

  • Symmetric key

  • Recovery key

  • Public key

Erklärung

Frage 8 von 50

1

Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by
sweep devices?

Wähle eine der folgenden:

  • HTTPS

  • SSH

  • IPv4

  • ICMP

Erklärung

Frage 9 von 50

1

Which of the following security threats does shredding mitigate?

Wähle eine der folgenden:

  • Shoulder surfing

  • Document retention

  • Tailgating

  • Dumpster diving

Erklärung

Frage 10 von 50

1

A thumbprint scanner is used to test which of the following aspects of human authentication?

Wähle eine der folgenden:

  • Something a user did

  • Something a user has

  • Something a user is

  • Something a user knows

Erklärung

Frage 11 von 50

1

Which of the following protocols requires the use of a CA based authentication process?

Wähle eine der folgenden:

  • FTPS implicit

  • FTPS explicit

  • MD5

  • PEAP-TLS

Erklärung

Frage 12 von 50

1

Which of the following malware types is an antivirus scanner MOST unlikely to discover? (Select TWO)

Wähle eine oder mehr der folgenden:

  • Trojan

  • Pharming

  • Worms

  • Virus

  • Logic bomb

Erklärung

Frage 13 von 50

1

Which of the following is specific to a buffer overflow attack?

Wähle eine der folgenden:

  • Memory addressing

  • Directory traversal

  • Initial vector

  • Session cookies

Erklärung

Frage 14 von 50

1

An existing application has never been assessed from a security perspective. Which of the following is the
BEST assessment technique in order to identify the application's security posture?

Wähle eine der folgenden:

  • Baseline reporting

  • Protocol analysis

  • Threat modeling

  • Functional testing

Erklärung

Frage 15 von 50

1

A security administrator with full administrative rights on the network is forced to change roles on a quarterly
basis with another security administrator. Which of the following describes this form of access control?

Wähle eine der folgenden:

  • Job rotation

  • Separation of duties

  • Mandatory vacation

  • Least privilege

Erklärung

Frage 16 von 50

1

DRPs should contain which of the following?

Wähle eine der folgenden:

  • Hierarchical list of non-critical personnel

  • Hierarchical list of critical systems

  • Hierarchical access control lists

  • Identification of single points of failure

Erklärung

Frage 17 von 50

1

Which of the following is a security threat that hides itself within another piece of executable software?

Wähle eine der folgenden:

  • Botnet

  • Logic Bomb

  • Trojan

  • Worm

Erklärung

Frage 18 von 50

1

A user was trying to update an open file but when they tried to access the file they were denied. Which of the
following would explain why the user could not access the file?

Wähle eine der folgenden:

  • Audit only access

  • Execute only access

  • Rights are not set correctly

  • Write only access

Erklärung

Frage 19 von 50

1

A technician is deciding between implementing a HIDS on the database server or implementing a NIDS. Which
of the following are reasons why a NIDS may be better to implement? (Select TWO)

Wähle eine oder mehr der folgenden:

  • Many HIDS require frequent patches and updates

  • Many HIDS are not able to detect network attacks

  • Many HIDS have a negative impact on system performance

  • Many HIDS only offer a low level of detection granularity

  • Many HIDS are not good at detecting attacks on database servers

Erklärung

Frage 20 von 50

1

Which of the following organizational documentation describes step by step how tasks or job functions should
be conducted?

Wähle eine der folgenden:

  • Standards

  • Guideline

  • Policy

  • Procedures

Erklärung

Frage 21 von 50

1

According to company policy an administrator must logically keep the Human Resources department separated
from the Accounting department. Which of the following would be the simplest way to accomplish this?

Wähle eine der folgenden:

  • NIDS

  • DMZ

  • NAT

  • VLAN

Erklärung

Frage 22 von 50

1

Which of the following is the MOST common logical access control method?

Wähle eine der folgenden:

  • Access control lists

  • Usernames and password

  • Multifactor authentication

  • Security ID badges

Erklärung

Frage 23 von 50

1

Which of the following access control methods could the administrator implement because of constant hiring of
new personnel?

Wähle eine der folgenden:

  • Rule-based

  • Role-based

  • Discretionary

  • Decentralized

Erklärung

Frage 24 von 50

1

After a period of high employee turnover, which of the following should be implemented?

Wähle eine der folgenden:

  • A review of NTLM hashes on the domain servers

  • A review of group policies

  • A review of user access and rights

  • A review of storage and retention policies

Erklärung

Frage 25 von 50

1

Multiple web servers are fed from a load balancer. Which of the following is this an example of?

Wähle eine der folgenden:

  • RAID

  • Backup generator

  • Hot site

  • Redundant servers

Erklärung

Frage 26 von 50

1

An instance where an IDS identifies legitimate traffic as malicious activity is called which of the following?

Wähle eine der folgenden:

  • False positive

  • True negative

  • False negative

  • True positive

Erklärung

Frage 27 von 50

1

Which of the following protocols are used to secure e-commerce transactions? (Select TWO).

Wähle eine oder mehr der folgenden:

  • TLS

  • IPSec

  • SSH

  • SSL

  • RTP

Erklärung

Frage 28 von 50

1

Which of the following sends unsolicited messages to another user cell phone via Bluetooth?

Wähle eine der folgenden:

  • Blue jacking

  • Smurfing

  • Data emanation

  • Bluesnarfing

Erklärung

Frage 29 von 50

1

Which of the following network protocols facilitates hiding internal addresses from the Internet?

Wähle eine der folgenden:

  • DMZ

  • NAT

  • NAC

  • ARP

Erklärung

Frage 30 von 50

1

An administrator wishes to deploy an IPSec VPN connection between two routers across a WAN. The
administrator wants to ensure that the VPN is encrypted in the most secure fashion possible. Which of the
following BEST identifies the correct IPSec mode and the proper configuration?

Wähle eine der folgenden:

  • IPSec in tunnel mode, using both the ESP and AH protocols

  • IPSec in tunnel mode, using the ESP protocol

  • IPSec in transport mode, using the AH protocol

  • IPSec in transport mode, using both ESP and AH protocols

Erklärung

Frage 31 von 50

1

A company wants to ensure that users only use their accounts between 8AM and 6PM Monday thru Friday.
Which of the following access control methods would be MOST effective for this purpose?

Wähle eine der folgenden:

  • Account expiration

  • Logical tokens

  • Time of day restrictions

  • Group policies

Erklärung

Frage 32 von 50

1

Which of the following sends data packets to various IP ports on a host to determine the responsive ports?

Wähle eine der folgenden:

  • OVAL

  • Network sniffer

  • Protocol analyzer

  • Network mappers

Erklärung

Frage 33 von 50

1

Which of the following would be a benefit of testing a program of an unknown source on a virtual machine?

Wähle eine der folgenden:

  • Virtual machines render it impossible for the code to escape

  • Virtual machines allow for faster performance, so the speed of benchmark testing is increased

  • Virtual machines come equipped with a firewall by default, thus preventing outside contamination

  • Virtual machines can easily be restored to an earlier point if the code is malicious or causes instability

Erklärung

Frage 34 von 50

1

A company has a problem with users inadvertently posting company information on the Internet. Which of the
following is the BEST method for the company to address it?

Wähle eine der folgenden:

  • Educate the users and perform awareness training

  • Harden the password policies in case of future breaches

  • Routinely audit all users browser history

  • Implement HR policies with consequences

Erklärung

Frage 35 von 50

1

Which of the following describes what has occurred after a user has successfully gained access to a secure
system?

Wähle eine der folgenden:

  • Authentication

  • Authenticity

  • Identification

  • Confidentiality

Erklärung

Frage 36 von 50

1

Which of the following is a benefit of applying operating system service packs, patches, and hotfixes?

Wähle eine der folgenden:

  • Protects systems from known vulnerabilities

  • Minimizes the need to deploy honeypots

  • Hardens systems against dictionary attacks

  • Replaces default and guest accounts

Erklärung

Frage 37 von 50

1

Which of the following standards encodes messages blocks of 64-bit and uses 56 bits for the encryption key?

Wähle eine der folgenden:

  • SHA

  • AES

  • DES

  • Blowfish

Erklärung

Frage 38 von 50

1

A user reports that after searching the Internet for office supplies and visiting one of the search engine results
websites, they began receiving unsolicited pop-ups on subsequent website visits. Which of the following is the
MOST likely cause of the unsolicited pop-ups?

Wähle eine der folgenden:

  • Virus

  • Trojan

  • Adware

  • Spam

Erklärung

Frage 39 von 50

1

Which of the following encryption methods uses prime number factoring to obtain its strength?

Wähle eine der folgenden:

  • Elliptic curve

  • RSA

  • AES

  • 3DES

Erklärung

Frage 40 von 50

1

An administrator is required to keep certain workstations free of malware at all times, but those workstations
need to be able to access any Internet site. Which of the following solutions would be the BEST choice?

Wähle eine der folgenden:

  • Updated antivirus software

  • Pop-up blockers

  • Personal firewall

  • Updated anti-spam software

Erklärung

Frage 41 von 50

1

A network administrator places a firewall between a file server and the public Internet and another firewall
between the file server and the company internal servers. This is an example of which of the following design
elements?

Wähle eine der folgenden:

  • DMZ

  • Subnetting

  • VLAN

  • NAT

Erklärung

Frage 42 von 50

1

Which of the following redundancy planning concepts is generally the MOST expensive?

Wähle eine der folgenden:

  • Cold site

  • Hot site

  • Warm site

  • Field site

Erklärung

Frage 43 von 50

1

Which of the following behavior-based security appliances are used to block suspicious activity from entering
the network?

Wähle eine der folgenden:

  • Antivirus

  • HIDS

  • IPS

  • IDS

Erklärung

Frage 44 von 50

1

Which of the following design elements could be set to only allow machines on the network if they are current
with patches and antivirus definitions?

Wähle eine der folgenden:

  • RBAC

  • NAC

  • MAC

  • DAC

Erklärung

Frage 45 von 50

1

Which of the following would be implemented to detect attacks on an individual system?

Wähle eine der folgenden:

  • Firewall

  • Honeypot

  • NIPS

  • HIDS

Erklärung

Frage 46 von 50

1

Which of the following logs would MOST likely indicate that there is an ongoing brute force attack against a
server local administrator account?

Wähle eine der folgenden:

  • Firewall

  • System

  • Performance

  • Access

Erklärung

Frage 47 von 50

1

Which of the following is a best practice for coding applications in a secure manner?

Wähle eine der folgenden:

  • Input validation

  • Object oriented coding

  • Rapid Application Development (RAD)

  • Cross-site scripting

Erklärung

Frage 48 von 50

1

Which of the following may be an indication of a possible system compromise?

Wähle eine der folgenden:

  • A port monitor utility shows that there are many connections to port 8 on the Internet facing web server

  • A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline

  • A protocol analyzer records a high number of UDP packets to a streaming media server on the Internet

  • The certificate for one of the web servers has expired and transactions on that server begins to drop rapidly

Erklärung

Frage 49 von 50

1

Which of the following authentication methods would MOST likely prevent an attacker from being able to
successfully deploy a replay attack?

Wähle eine der folgenden:

  • TACACS

  • RAS

  • RADIUS

  • Kerberos

Erklärung

Frage 50 von 50

1

Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly
embed data?

Wähle eine der folgenden:

  • Steganography

  • Worm

  • Trojan horse

  • Virus

Erklärung