SY0-301 Part 3

Beschreibung

Questions 101- 150
Brooks Thornhill
Quiz von Brooks Thornhill, aktualisiert more than 1 year ago
Brooks Thornhill
Erstellt von Brooks Thornhill vor fast 8 Jahre
19
0

Zusammenfassung der Ressource

Frage 1

Frage
A security administrator is asked to email an employee their password. Which of the following account policies MUST be set to ensure the employee changes their password promptly?
Antworten
  • Password expiration
  • Account lockout
  • Password recovery
  • Account enablement

Frage 2

Frage
Which of the following is the BEST way to mitigate data loss if a portable device is compromised?
Antworten
  • Full disk encryption
  • Common access card
  • Strong password complexity
  • Biometric authentication

Frage 3

Frage
Data can potentially be stolen from a disk encrypted, screen-lock protected, smartphone by which of the following?
Antworten
  • Bluesnarfing
  • IV attack
  • Honeynet
  • SIM cloning

Frage 4

Frage
A purpose of LDAP authentication services is:
Antworten
  • to implement mandatory access controls
  • a single point of user management
  • to prevent multifactor authentication
  • to issue one-time hashed passwords

Frage 5

Frage
Which of the following allows an attacker to identify vulnerabilities within a closed source software application?
Antworten
  • Fuzzing
  • Compiling
  • Code reviews
  • Vulnerability scanning

Frage 6

Frage
Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Antworten
  • Encryption methods
  • Power levels
  • SSID
  • Radio frequency

Frage 7

Frage
Which of the following elements of PKI are found in a browser's trusted root CA?
Antworten
  • Private key
  • Symmetric key
  • Recovery key
  • Public key

Frage 8

Frage
Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Antworten
  • HTTPS
  • SSH
  • IPv4
  • ICMP

Frage 9

Frage
Which of the following security threats does shredding mitigate?
Antworten
  • Shoulder surfing
  • Document retention
  • Tailgating
  • Dumpster diving

Frage 10

Frage
A thumbprint scanner is used to test which of the following aspects of human authentication?
Antworten
  • Something a user did
  • Something a user has
  • Something a user is
  • Something a user knows

Frage 11

Frage
Which of the following protocols requires the use of a CA based authentication process?
Antworten
  • FTPS implicit
  • FTPS explicit
  • MD5
  • PEAP-TLS

Frage 12

Frage
Which of the following malware types is an antivirus scanner MOST unlikely to discover? (Select TWO)
Antworten
  • Trojan
  • Pharming
  • Worms
  • Virus
  • Logic bomb

Frage 13

Frage
Which of the following is specific to a buffer overflow attack?
Antworten
  • Memory addressing
  • Directory traversal
  • Initial vector
  • Session cookies

Frage 14

Frage
An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Antworten
  • Baseline reporting
  • Protocol analysis
  • Threat modeling
  • Functional testing

Frage 15

Frage
A security administrator with full administrative rights on the network is forced to change roles on a quarterly basis with another security administrator. Which of the following describes this form of access control?
Antworten
  • Job rotation
  • Separation of duties
  • Mandatory vacation
  • Least privilege

Frage 16

Frage
DRPs should contain which of the following?
Antworten
  • Hierarchical list of non-critical personnel
  • Hierarchical list of critical systems
  • Hierarchical access control lists
  • Identification of single points of failure

Frage 17

Frage
Which of the following is a security threat that hides itself within another piece of executable software?
Antworten
  • Botnet
  • Logic Bomb
  • Trojan
  • Worm

Frage 18

Frage
A user was trying to update an open file but when they tried to access the file they were denied. Which of the following would explain why the user could not access the file?
Antworten
  • Audit only access
  • Execute only access
  • Rights are not set correctly
  • Write only access

Frage 19

Frage
A technician is deciding between implementing a HIDS on the database server or implementing a NIDS. Which of the following are reasons why a NIDS may be better to implement? (Select TWO)
Antworten
  • Many HIDS require frequent patches and updates
  • Many HIDS are not able to detect network attacks
  • Many HIDS have a negative impact on system performance
  • Many HIDS only offer a low level of detection granularity
  • Many HIDS are not good at detecting attacks on database servers

Frage 20

Frage
Which of the following organizational documentation describes step by step how tasks or job functions should be conducted?
Antworten
  • Standards
  • Guideline
  • Policy
  • Procedures

Frage 21

Frage
According to company policy an administrator must logically keep the Human Resources department separated from the Accounting department. Which of the following would be the simplest way to accomplish this?
Antworten
  • NIDS
  • DMZ
  • NAT
  • VLAN

Frage 22

Frage
Which of the following is the MOST common logical access control method?
Antworten
  • Access control lists
  • Usernames and password
  • Multifactor authentication
  • Security ID badges

Frage 23

Frage
Which of the following access control methods could the administrator implement because of constant hiring of new personnel?
Antworten
  • Rule-based
  • Role-based
  • Discretionary
  • Decentralized

Frage 24

Frage
After a period of high employee turnover, which of the following should be implemented?
Antworten
  • A review of NTLM hashes on the domain servers
  • A review of group policies
  • A review of user access and rights
  • A review of storage and retention policies

Frage 25

Frage
Multiple web servers are fed from a load balancer. Which of the following is this an example of?
Antworten
  • RAID
  • Backup generator
  • Hot site
  • Redundant servers

Frage 26

Frage
An instance where an IDS identifies legitimate traffic as malicious activity is called which of the following?
Antworten
  • False positive
  • True negative
  • False negative
  • True positive

Frage 27

Frage
Which of the following protocols are used to secure e-commerce transactions? (Select TWO).
Antworten
  • TLS
  • IPSec
  • SSH
  • SSL
  • RTP

Frage 28

Frage
Which of the following sends unsolicited messages to another user cell phone via Bluetooth?
Antworten
  • Blue jacking
  • Smurfing
  • Data emanation
  • Bluesnarfing

Frage 29

Frage
Which of the following network protocols facilitates hiding internal addresses from the Internet?
Antworten
  • DMZ
  • NAT
  • NAC
  • ARP

Frage 30

Frage
An administrator wishes to deploy an IPSec VPN connection between two routers across a WAN. The administrator wants to ensure that the VPN is encrypted in the most secure fashion possible. Which of the following BEST identifies the correct IPSec mode and the proper configuration?
Antworten
  • IPSec in tunnel mode, using both the ESP and AH protocols
  • IPSec in tunnel mode, using the ESP protocol
  • IPSec in transport mode, using the AH protocol
  • IPSec in transport mode, using both ESP and AH protocols

Frage 31

Frage
A company wants to ensure that users only use their accounts between 8AM and 6PM Monday thru Friday. Which of the following access control methods would be MOST effective for this purpose?
Antworten
  • Account expiration
  • Logical tokens
  • Time of day restrictions
  • Group policies

Frage 32

Frage
Which of the following sends data packets to various IP ports on a host to determine the responsive ports?
Antworten
  • OVAL
  • Network sniffer
  • Protocol analyzer
  • Network mappers

Frage 33

Frage
Which of the following would be a benefit of testing a program of an unknown source on a virtual machine?
Antworten
  • Virtual machines render it impossible for the code to escape
  • Virtual machines allow for faster performance, so the speed of benchmark testing is increased
  • Virtual machines come equipped with a firewall by default, thus preventing outside contamination
  • Virtual machines can easily be restored to an earlier point if the code is malicious or causes instability

Frage 34

Frage
A company has a problem with users inadvertently posting company information on the Internet. Which of the following is the BEST method for the company to address it?
Antworten
  • Educate the users and perform awareness training
  • Harden the password policies in case of future breaches
  • Routinely audit all users browser history
  • Implement HR policies with consequences

Frage 35

Frage
Which of the following describes what has occurred after a user has successfully gained access to a secure system?
Antworten
  • Authentication
  • Authenticity
  • Identification
  • Confidentiality

Frage 36

Frage
Which of the following is a benefit of applying operating system service packs, patches, and hotfixes?
Antworten
  • Protects systems from known vulnerabilities
  • Minimizes the need to deploy honeypots
  • Hardens systems against dictionary attacks
  • Replaces default and guest accounts

Frage 37

Frage
Which of the following standards encodes messages blocks of 64-bit and uses 56 bits for the encryption key?
Antworten
  • SHA
  • AES
  • DES
  • Blowfish

Frage 38

Frage
A user reports that after searching the Internet for office supplies and visiting one of the search engine results websites, they began receiving unsolicited pop-ups on subsequent website visits. Which of the following is the MOST likely cause of the unsolicited pop-ups?
Antworten
  • Virus
  • Trojan
  • Adware
  • Spam

Frage 39

Frage
Which of the following encryption methods uses prime number factoring to obtain its strength?
Antworten
  • Elliptic curve
  • RSA
  • AES
  • 3DES

Frage 40

Frage
An administrator is required to keep certain workstations free of malware at all times, but those workstations need to be able to access any Internet site. Which of the following solutions would be the BEST choice?
Antworten
  • Updated antivirus software
  • Pop-up blockers
  • Personal firewall
  • Updated anti-spam software

Frage 41

Frage
A network administrator places a firewall between a file server and the public Internet and another firewall between the file server and the company internal servers. This is an example of which of the following design elements?
Antworten
  • DMZ
  • Subnetting
  • VLAN
  • NAT

Frage 42

Frage
Which of the following redundancy planning concepts is generally the MOST expensive?
Antworten
  • Cold site
  • Hot site
  • Warm site
  • Field site

Frage 43

Frage
Which of the following behavior-based security appliances are used to block suspicious activity from entering the network?
Antworten
  • Antivirus
  • HIDS
  • IPS
  • IDS

Frage 44

Frage
Which of the following design elements could be set to only allow machines on the network if they are current with patches and antivirus definitions?
Antworten
  • RBAC
  • NAC
  • MAC
  • DAC

Frage 45

Frage
Which of the following would be implemented to detect attacks on an individual system?
Antworten
  • Firewall
  • Honeypot
  • NIPS
  • HIDS

Frage 46

Frage
Which of the following logs would MOST likely indicate that there is an ongoing brute force attack against a server local administrator account?
Antworten
  • Firewall
  • System
  • Performance
  • Access

Frage 47

Frage
Which of the following is a best practice for coding applications in a secure manner?
Antworten
  • Input validation
  • Object oriented coding
  • Rapid Application Development (RAD)
  • Cross-site scripting

Frage 48

Frage
Which of the following may be an indication of a possible system compromise?
Antworten
  • A port monitor utility shows that there are many connections to port 8 on the Internet facing web server
  • A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline
  • A protocol analyzer records a high number of UDP packets to a streaming media server on the Internet
  • The certificate for one of the web servers has expired and transactions on that server begins to drop rapidly

Frage 49

Frage
Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?
Antworten
  • TACACS
  • RAS
  • RADIUS
  • Kerberos

Frage 50

Frage
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
Antworten
  • Steganography
  • Worm
  • Trojan horse
  • Virus
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

EU, OHG, KG, GmbH
Stefan Kurtenbach
Altenpflege Prüfungsfragen
anna.grillborzer0656
Informatik
Tom Kühling
Evolution - Theorien und Methoden
Jeannette Eckert
La mondialisation - Vocab
Gaelle Bourgeois
EC Klinische Psychologie
Sandra S.
Vetie Pharma Datum unbekannt
Alina Stumpf
Vetie Virologie 2014
J R
Vetie Virologie 2015
J R
AVO 2017
Schmolli Schmoll
Vetie Spezielle Pathologie 2022
Alessandro Bertino