Brooks Thornhill
Quiz by , created more than 1 year ago

CISSP (Brooks) (SY0-201) Quiz on SY0-201 Part 3, created by Brooks Thornhill on 15/08/2016.

8
0
0
Brooks Thornhill
Created by Brooks Thornhill almost 8 years ago
Close

SY0-201 Part 3

Question 1 of 48

1

Which of the following is a goal of penetration testing?

Select one of the following:

  • Passively assess web vulnerabilities

  • To check compliance of the router configuration

  • Provide a passive check of the networks security

  • Actively assess deployed security controls

Explanation

Question 2 of 48

1

Using a smartcard and a physical token is considered how many factors of authentication?

Select one of the following:

  • One

  • Two

  • Three

  • Four

Explanation

Question 3 of 48

1

Which of the following increases availability during periods of electromagnetic interference? (Select
TWO)

Select one or more of the following:

  • Fiber optic cable

  • Straight-through cable

  • STP cable

  • Crossover cable

  • UTP cable

Explanation

Question 4 of 48

1

A computer is displaying an MBR error upon restart. The technician is told the user has just installed
new software. Which of the following threats is the MOST likely cause of this error?

Select one of the following:

  • Distributed DoS

  • Boot sector virus

  • ActiveX

  • Trojan

Explanation

Question 5 of 48

1

Which of the following should be disabled to help prevent boot sector viruses from launching when a
computer boots?

Select one of the following:

  • SNMP

  • DMZ

  • USB

  • Hard Drive

Explanation

Question 6 of 48

1

Which of the following video surveillance systems should be installed on an existing network?

Select one of the following:

  • Microwave

  • Analog

  • CCTV

  • IP

Explanation

Question 7 of 48

1

Which of the following has a 128-bit message digest?

Select one of the following:

  • NTLM

  • MD5

  • SHA

  • 3DES

Explanation

Question 8 of 48

1

Which of the following is commonly used to secure HTTP and SMTP traffic?

Select one of the following:

  • SHA

  • SFTP

  • TLS

  • SCP

Explanation

Question 9 of 48

1

Which of the following uses an RC4 key that can be discovered by eavesdropping on plain text
initialization vectors?

Select one of the following:

  • WEP

  • TKIP

  • SSH

  • WPA

Explanation

Question 10 of 48

1

A retinal scanner provides which of the following authentication types?

Select one of the following:

  • Biometric

  • Token

  • Two-factor

  • Optic

Explanation

Question 11 of 48

1

The accounting group, clinical group and operations group only have access to their own applications.
The company often needs auditors to have access to all three groups applications with little notice. Which
of the following would simplify the process of granting auditors permissions to all the applications?

Select one of the following:

  • Create an auditors group and merge the members of the accounting, clinical and operations groups

  • Create an auditors group and add each user to the accounting, clinical and operations groups
    individually

  • Create an auditors group and add each of the accounting, clinical and operations groups to the auditors group

  • Create an auditors group and add the group to each of the accounting, clinical and operations groups

Explanation

Question 12 of 48

1

Which of the following utilities would allow a system administrator to discover why an ISP is generating
a large amount of TCP RST packets?

Select one of the following:

  • L0phtcrack

  • Wireshark

  • Nmap

  • Nessus

Explanation

Question 13 of 48

1

A large amount of continuous small transmissions are originating from multiple external hosts to the
corporate web server, which is also inaccessible to users. Which of the following attacks is MOST likely the
cause?

Select one of the following:

  • Spoofing

  • DNS poisoning

  • DDoS

  • DoS

Explanation

Question 14 of 48

1

A network security administrator is worried about potential man-in-the-middle attacks against users
when they access a corporate website from their workstations. Which of the following is the BEST
mitigation against this type of attack?

Select one of the following:

  • Implementing server-side PKI certificates for all connections

  • Mandating only client-side PKI certificates for all connections

  • Requiring client and server PKI certificates for all connections

  • Requiring strong authentication for all DNS queries

Explanation

Question 15 of 48

1

The security administrator at a small company is having trouble sending and receiving SMTP traffic
from the network to the external gateway. Network utilization is very high with most traffic originating at one
external IP address and ending at the SMTP server. Which of the following is MOST likely happening?

Select one of the following:

  • DoS attack

  • Open mail relays

  • Distributed DoS attack

  • Spear-phishing

Explanation

Question 16 of 48

1

The last company administrator failed to renew the registration for the corporate web site (e.g.
https://www.comptia.org). When the new administrator tried to register the website it is discovered that the
registration is being held by a series of small companies for very short periods of time. This is typical of
which of the following?

Select one of the following:

  • Spoofing

  • TCP/IP hijacking

  • Domain name kiting

  • DNS poisoning

Explanation

Question 17 of 48

1

When used to encrypt transmissions, which of the following is the MOST resistant to brute force attacks?

Select one of the following:

  • SHA

  • MD5

  • 3DES

  • AES256

Explanation

Question 18 of 48

1

Which of the following is the BEST choice for whole disk encryption when confidentiality is the primary
concern?

Select one of the following:

  • PGP

  • 3DES

  • DES

  • AES

Explanation

Question 19 of 48

1

The primary purpose of a hot site is to ensure which of the following?

Select one of the following:

  • Adequate HVAC to meet environmental initiatives

  • Recovery of operations within 30 days after a disaster

  • Transition of operations in a short time period in a disaster

  • Seamless operations in the event of a disaster

Explanation

Question 20 of 48

1

Which of the following is a component of a disaster recovery plan for a company that expects a site to
be rendered non-usable during a disaster and needs a nearly transparent transfer of operations?

Select one of the following:

  • Warm site

  • Cold site

  • Hot site

  • Alternate site

Explanation

Question 21 of 48

1

Which of the following is the BEST mitigation method to implement when protecting against a
discovered OS exploit?

Select one of the following:

  • NIDS

  • Patch

  • Antivirus update

  • HIDS

Explanation

Question 22 of 48

1

Which of the following MUST be taken into account when conducting risk assessments on necessary
systems that are very old, costly to maintain, and very difficult to upgrade?

Select one of the following:

  • Likelihood vulnerability will be exploited

  • Frequency of patches published by the developer

  • Likelihood an attacker will notice the system

  • Maintenance costs associated with the system

Explanation

Question 23 of 48

1

Implicit deny is the practice of setting ACLs to which of the following conditions?

Select one of the following:

  • Verify all IP packets

  • Not allow by default

  • Transfer all traffic

  • Not allow by exception

Explanation

Question 24 of 48

1

Which of the following can virtualization technology provide with respect to availability?

Select one of the following:

  • The capability to manually transition hosts as hardware is added

  • The capacity to deploy more encrypted guests than hardware allows

  • The capability to automatically transition guests as hardware fails

  • The ability to provision more services during off peak hours

Explanation

Question 25 of 48

1

Which of the following is made possible by some commercial virtualization hosting applications?

Select one of the following:

  • Automatic redundancy for power in the event of a blackout

  • Seamless switching between telephony and IP telephony

  • Automatic transfer of applications when hardware fails

  • Transfer of network infrastructure components to meet demand

Explanation

Question 26 of 48

1

Cell phones with network access and the ability to store data files are susceptible to which of the
following risks?

Select one of the following:

  • Input validation errors

  • SMTP open relays

  • Viruses

  • Logic bombs

Explanation

Question 27 of 48

1

If an administrator wanted to gather information about the tools and techniques used by attackers,
which of the following could be used?

Select one of the following:

  • VLANs

  • Honeypot

  • Back door

  • Firewall

Explanation

Question 28 of 48

1

Shielded communications media is MOST often used to prevent electrical emanations from being
detected and crosstalk between which of the following?

Select one of the following:

  • Networks

  • Cables

  • VLANs

  • VPNs

Explanation

Question 29 of 48

1

To prevent unintentional DoS, which of the following should network users be restricted from doing?

Select one of the following:

  • Printing to non-local printers

  • Restarting their own print jobs

  • Installing print management software

  • Deleting jobs from the print queue

Explanation

Question 30 of 48

1

Which of the following would a network administrator implement to control traffic being routed between
networks or network segments in an effort to preserve data confidentiality?

Select one of the following:

  • NAT

  • Group policies

  • Password policies

  • ACLs

Explanation

Question 31 of 48

1

An employee reports that while at the airport an unknown user was taking pictures of the employees
screen. This is commonly known as which of the following?

Select one of the following:

  • Shoulder surfing

  • Phishing

  • Spyware

  • Dumpster diving

Explanation

Question 32 of 48

1

The director of finance is worried about information being seen while working on a laptop at the local
coffee shop. Which of the following can be used to avoid shoulder surfing?

Select one of the following:

  • Spyware

  • Antivirus

  • Privacy screen

  • Spam

Explanation

Question 33 of 48

1

A user needs to send bank account information to the Human Resource department for payroll. This
type of information is considered which of the following?

Select one of the following:

  • Due care

  • Personally identifiable information

  • Due process

  • Classification of information

Explanation

Question 34 of 48

1

A user wants to send personally identifiable information to the security office via email, so they can
perform a background check. Which of the following should be used to send the information to the security
office?

Select one of the following:

  • Level of importance

  • Digital signature

  • Encryption

  • Signature line

Explanation

Question 35 of 48

1

A security administrator wants to prevent employees from sending unencrypted email with proprietary
information. Which of the following can help mitigate this type of problem?

Select one of the following:

  • User awareness training

  • Dumpster diving

  • Personally identifiable information

  • Change management policy

Explanation

Question 36 of 48

1

A technician needs to setup a secure room to enable a private VTC system. Which of the following
should be installed to prevent devices from listening to the VTC?

Select one of the following:

  • Shielding

  • HIDS

  • HVAC

  • MD5 hashing

Explanation

Question 37 of 48

1

A user reports that the workstation is going to obscure websites unexpectedly. Which of the following
should a first responder do when arriving at the workstation?

Select one of the following:

  • Record the findings

  • Shutdown the workstation

  • Format the hard drive

  • Upgrade the operating system

Explanation

Question 38 of 48

1

A technician is setting up a secure laptop and wants to ensure that every log is captured for later
evaluation. In which of the following locations would this information need to be noted?

Select one of the following:

  • Disaster recovery plan

  • Retention policy

  • Group policy

  • User review

Explanation

Question 39 of 48

1

The president of the company is trying to get to their banks website, and the browser is displaying that
the webpage is being blocked by the system administrator.Which of the following logs would the technician
review?

Select one of the following:

  • DNS

  • Performance

  • System

  • Content filter

Explanation

Question 40 of 48

1

A user reports that the spreadsheet they use for the department will not open. The spreadsheet is
located on a server that was recently patched. Which of the following logs would the technician review
FIRST?

Select one of the following:

  • Access

  • Firewall

  • Antivirus

  • DNS

Explanation

Question 41 of 48

1

Which of the following allows a users private IP address to be displayed as the firewall IP address
when browsing the Internet?

Select one of the following:

  • Screened subnet

  • Dual-homed

  • DHCP

  • NAT

Explanation

Question 42 of 48

1

A user reports that each time they attempt to go to a legitimate website, they are sent to an
inappropriate website. The security administrator suspects the user may have malware on the computer,
which manipulated some of the users files. Which of the following files on the users system would need to
be checked for unauthorized changes?

Select one of the following:

  • SAM

  • LMhosts

  • Services

  • Hosts

Explanation

Question 43 of 48

1

A security administrator responds to a report of a web server that has been compromised. The security
administrator observes the background has been changed to an image of an attacker group. Which of the
following would be the FIRST step in the incident response process?

Select one of the following:

  • Run an antivirus scan

  • Disable the network connection

  • Power down the server

  • Print a copy of the background

Explanation

Question 44 of 48

1

While responding to a confirmed breach of the organizations web server, the security administrator
determines the source of the attack was from a rival organizations IP address range.Which of the following
should the security administer do with this information?

Select one of the following:

  • Notify the Help Desk

  • Notify ICANN

  • Notify management

  • Notify the rival organizations IT department

Explanation

Question 45 of 48

1

Which of the following organizational disaster recovery types would provide a building and network
equipment but not current application data?

Select one of the following:

  • Warm site

  • Field site

  • Cold site

  • Hot site

Explanation

Question 46 of 48

1

A security administrator is installing a new NIDS. For the NIDS to view all of the available traffic on a
given segment, which of the following must the network administrator configure on the switch?

Select one of the following:

  • VLAN

  • Mirrored port

  • NAT

  • Management interface

Explanation

Question 47 of 48

1

Which of the following solutions will allow a security administrator to implement a white list of
applications authorized on a users PC?

Select one of the following:

  • Antivirus

  • HIPS

  • HIDS

  • Anti-spam

Explanation

Question 48 of 48

1

Which of the following is an authentication method that uses symmetric key encryption and a key
distribution center?

Select one of the following:

  • MS-CHAP

  • Kerberos

  • 802.1x

  • EAP

Explanation