Brooks Thornhill
Quiz by , created more than 1 year ago

Questions 1 - 50

12
0
0
Brooks Thornhill
Created by Brooks Thornhill almost 8 years ago
Close

SY0-301 Part 1

Question 1 of 50

1

Which of the following elements of PKI are found in a browser's trusted root CA?

Select one of the following:

  • Private key

  • Symmetric key

  • Recovery key

  • Public key

Explanation

Question 2 of 50

1

Which of the following protocols only encrypts password packets from client to server?

Select one of the following:

  • XTACACS

  • TACACS

  • RADIUS

  • TACACS+

Explanation

Question 3 of 50

1

Where are revoked certificates stored?

Select one of the following:

  • Recovery agent

  • Registration

  • Key escrow

  • CRL

Explanation

Question 4 of 50

1

DRPs should contain which of the following?

Select one of the following:

  • Hierarchical list of non-critical personnel

  • Hierarchical list of critical systems

  • Hierarchical access control lists

  • Identification of single points of failure

Explanation

Question 5 of 50

1

A system administrator could have a user level account and an administrator account to prevent:

Select one of the following:

  • password sharing

  • escalation of privileges

  • implicit deny

  • administrative account lockout

Explanation

Question 6 of 50

1

Which of the following is the BEST way to mitigate data loss if a portable device is compromised?

Select one of the following:

  • Full disk encryption

  • Common access card

  • Strong password complexity

  • Biometric authentication

Explanation

Question 7 of 50

1

Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by
sweep devices?

Select one of the following:

  • HTTPS

  • SSH

  • IPv4

  • ICMP

Explanation

Question 8 of 50

1

Which of the following is specific to a buffer overflow attack?

Select one of the following:

  • Memory addressing

  • Directory traversal

  • Initialization vector

  • Session cookies

Explanation

Question 9 of 50

1

Which of the following asymmetric encryption keys is used to encrypt data to ensure only the intended recipient
can decrypt the ciphertext?

Select one of the following:

  • Private

  • Escrow

  • Public

  • Preshared

Explanation

Question 10 of 50

1

Which of the following should a security administrator implement to prevent users from disrupting network
connectivity, if a user connects both ends of a network cable to different switch ports?

Select one of the following:

  • VLAN separation

  • Access control

  • Loop protection

  • DMZ

Explanation

Question 11 of 50

1

A new enterprise solution is currently being evaluated due to its potential to increase the company's profit
margins. The security administrator has been asked to review its security implications. While evaluating the
product, various vulnerability scans were performed. It was determined that the product is not a threat but has
the potential to introduce additional vulnerabilities. Which of the following assessment types should the security
administrator also take into consideration while evaluating this product?

Select one of the following:

  • Threat assessment

  • Vulnerability assessment

  • Code assessment

  • Risk assessment

Explanation

Question 12 of 50

1

Which of the following requires special handling and explicit policies for data retention and data distribution?

Select one of the following:

  • Personally identifiable information

  • Phishing attacks

  • Zero day exploits

  • Personal electronic devices

Explanation

Question 13 of 50

1

Centrally authenticating multiple systems and applications against a federated user database is an example of:

Select one of the following:

  • smart card

  • common access card

  • single sign-on

  • access control list

Explanation

Question 14 of 50

1

WEP is seen as an unsecure protocol based on its improper implementation and use of which of the following?

Select one of the following:

  • RC6

  • RC4

  • 3DES

  • AES

Explanation

Question 15 of 50

1

Which of the following should be performed if a smartphone is lost to ensure no data can be retrieved from it?

Select one of the following:

  • Device encryption

  • Remote wipe

  • Screen lock

  • GPS tracking

Explanation

Question 16 of 50

1

In an 802.11n network, which of the following provides the MOST secure method of both encryption and
authorization?

Select one of the following:

  • WEP with 802.1x

  • WPA Enterprise

  • WPA2-PSK

  • WPA with TKIP

Explanation

Question 17 of 50

1

Which of the following methods of access, authentication, and authorization is the MOST secure by default?

Select one of the following:

  • Kerberos

  • TACACS

  • RADIUS

  • LDAP

Explanation

Question 18 of 50

1

Which of the following facilitates computing for heavily utilized systems and networks?

Select one of the following:

  • Remote access

  • Provider cloud

  • VPN concentrator

  • Telephony

Explanation

Question 19 of 50

1

With which of the following is RAID MOST concerned?

Select one of the following:

  • Integrity

  • Confidentiality

  • Availability

  • Baselining

Explanation

Question 20 of 50

1

Which of the following reduces the likelihood of a single point of failure when a server fails?

Select one of the following:

  • Clustering

  • Virtualization

  • RAID

  • Cold site

Explanation

Question 21 of 50

1

A user downloads a keygen to install pirated software. After running the keygen, system performance is
extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of
malware?

Select one of the following:

  • Logic bomb

  • Worm

  • Trojan

  • Adware

Explanation

Question 22 of 50

1

Which of the following is used in conjunction with PEAP to provide mutual authentication between peers?

Select one of the following:

  • LEAP

  • MSCHAPv2

  • PPP

  • MSCHAPv1

Explanation

Question 23 of 50

1

A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the
following?

Select one of the following:

  • Whaling

  • Bluesnarfing

  • Vishing

  • Dumpster diving

Explanation

Question 24 of 50

1

Which of the following uses TCP port 22 by default?

Select one of the following:

  • SSL, SCP, and TFTP

  • SSH, SCP, and SFTP

  • HTTPS, SFTP, and TFTP

  • TLS, TELNET, and SCP

Explanation

Question 25 of 50

1

Actively monitoring data streams in search of malicious code or behavior is an example of:

Select one of the following:

  • load balancing

  • an Internet proxy

  • URL filtering

  • content inspection

Explanation

Question 26 of 50

1

A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are
open on the network firewall. Which of the following should the security administrator check?

Select one of the following:

  • Anti-virus software

  • ACLs

  • Anti-spam software

  • NIDS

Explanation

Question 27 of 50

1

A Human Resource manager is assigning access to users in their specific department performing the same job
function. This is an example of:

Select one of the following:

  • role-based access control

  • rule-based access control

  • centralized access control

  • mandatory access control

Explanation

Question 28 of 50

1

Which of the following BEST describes the process of key escrow?

Select one of the following:

  • Maintains a copy of a user's public key for the sole purpose of recovering messages if it is lost

  • Maintains a secured copy of a user's private key to recover the certificate revocation list

  • Maintains a secured copy of a user's private key for the sole purpose of recovering the key if it is lost

  • Maintains a secured copy of a user's public key in order to improve network performance

Explanation

Question 29 of 50

1

Which of the following network devices would MOST likely be used to detect but not react to suspicious
behavior on the network?

Select one of the following:

  • Firewall

  • NIDS

  • NIPS

  • HIDS

Explanation

Question 30 of 50

1

Which of the following is an example of allowing a user to perform a self-service password reset?

Select one of the following:

  • Password length

  • Password recovery

  • Password complexity

  • Password expiration

Explanation

Question 31 of 50

1

Which of the following wireless attacks uses a counterfeit base station with the same SSID name as a nearby
intended wireless network?

Select one of the following:

  • War driving

  • Evil twin

  • Rogue access point

  • War chalking

Explanation

Question 32 of 50

1

A security administrator finished taking a forensic image of a computer's memory. Which of the following should
the administrator do to ensure image integrity?

Select one of the following:

  • Run the image through AES128

  • Run the image through a symmetric encryption algorithm

  • Compress the image to a password protected archive

  • Run the image through SHA256

Explanation

Question 33 of 50

1

Which of the following BEST explains the security benefit of a standardized server image?

Select one of the following:

  • All current security updates for the operating system will have already been applied

  • Mandated security configurations have been made to the operating system

  • Anti-virus software will be installed and current

  • Operating system license use is easier to track

Explanation

Question 34 of 50

1

Which of the following is the primary purpose of using a digital signature? (Select TWO)

Select one or more of the following:

  • Encryption

  • Integrity

  • Confidentiality

  • Non-repudiation

  • Availability

Explanation

Question 35 of 50

1

Which of the following must a security administrator do when the private key of a web server has been
compromised by an intruder?

Select one of the following:

  • Submit the public key to the CRL

  • Use the recovery agent to revoke the key

  • Submit the private key to the CRL

  • Issue a new CA

Explanation

Question 36 of 50

1

The security administrator often observes that an employee who entered the datacenter does not match the
owner of the PIN that was entered into the keypad. Which of the following would BEST prevent this situation?

Select one of the following:

  • Multifactor authentication

  • Username and password

  • Mandatory access control

  • Biometrics

Explanation

Question 37 of 50

1

A programmer allocates 16 bytes for a string variable, but does not adequately ensure that more than 16 bytes
cannot be copied into the variable. This program may be vulnerable to which of the following attacks?

Select one of the following:

  • Buffer overflow

  • Cross-site scripting

  • Session hijacking

  • Directory traversal

Explanation

Question 38 of 50

1

An administrator is updating firmware on routers throughout the company. Where should the administrator
document this work?

Select one of the following:

  • Event Viewer

  • Router's System Log

  • Change Management System

  • Compliance Review System

Explanation

Question 39 of 50

1

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric
key cryptography uses:

Select one of the following:

  • multiple keys for non-repudiation of bulk data

  • different keys on both ends of the transport medium

  • bulk encryption for data transmission over fiber

  • the same key on each end of the transmission medium

Explanation

Question 40 of 50

1

Which of the following allows a user to have a one-time password?

Select one of the following:

  • Biometrics

  • SSO

  • PIV

  • Tokens

Explanation

Question 41 of 50

1

Which of the following allows a security administrator to set device traps?

Select one of the following:

  • SNMP

  • TLS

  • ICMP

  • SSH

Explanation

Question 42 of 50

1

Which of the following is the BEST way to secure data for the purpose of retention?

Select one of the following:

  • Off-site backup

  • RAID 5 on-site backup

  • On-site clustering

  • Virtualization

Explanation

Question 43 of 50

1

In which of the following locations would a forensic analyst look to find a hooked process?

Select one of the following:

  • BIOS

  • Slack space

  • RAM

  • Rootkit

Explanation

Question 44 of 50

1

Several classified mobile devices have been stolen. Which of the following would BEST reduce the data
leakage threat?

Select one of the following:

  • Use GPS tracking to find the devices

  • Use stronger encryption algorithms

  • Immediately inform local law enforcement

  • Remotely sanitize the devices

Explanation

Question 45 of 50

1

Which of the following is an example of requiring users to have a password of 16 characters or more?

Select one of the following:

  • Password recovery requirements

  • Password complexity requirements

  • Password expiration requirements

  • Password length requirements

Explanation

Question 46 of 50

1

Which of the following devices provides storage for RSA or asymmetric keys and may assist in user
authentication? (Select TWO)

Select one or more of the following:

  • Trusted platform module

  • Hardware security module

  • Facial recognition scanner

  • Full disk encryption

  • Encrypted USB

Explanation

Question 47 of 50

1

A small company needs to invest in a new expensive database. The company's budget does not include the
purchase of additional servers or personnel. Which of the following solutions would allow the small company to
save money on hiring additional personnel and minimize the footprint in their current datacenter?

Select one of the following:

  • Allow users to telecommute

  • Setup a load balancer

  • Infrastructure as a Service

  • Software as a Service

Explanation

Question 48 of 50

1

A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote
branch. Which of the following protocols should be used for the tunnel?

Select one of the following:

  • RTP

  • SNMP

  • IPSec

  • 802.1X

Explanation

Question 49 of 50

1

When examining HTTP server logs the security administrator notices that the company's online store crashes
after a particular search string is executed by a single external user. Which of the following BEST describes this
type of attack?

Select one of the following:

  • Spim

  • DDoS

  • Spoofing

  • DoS

Explanation

Question 50 of 50

1

Which of the following MUST a programmer implement to prevent cross-site scripting?

Select one of the following:

  • Validate input to remove shell scripts

  • Validate input to remove hypertext

  • Validate input to remove batch files

  • Validate input to remove Java bit code

Explanation