Brooks Thornhill
Quiz by , created more than 1 year ago

Questions 51-100

20
0
0
Brooks Thornhill
Created by Brooks Thornhill almost 8 years ago
Close

SY0-301 Part 2

Question 1 of 50

1

Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of
data making it susceptible to brute force attacks?

Select one of the following:

  • PAP

  • NTLMv2

  • LANMAN

  • CHAP

Explanation

Question 2 of 50

1

Which of the following should be used to help prevent device theft of unused assets?

Select one of the following:

  • HSM device

  • Locking cabinet

  • Device encryption

  • GPS tracking

Explanation

Question 3 of 50

1

Which of the following security practices should occur initially in software development?

Select one of the following:

  • Secure code review

  • Patch management

  • Fuzzing

  • Penetration tests

Explanation

Question 4 of 50

1

Which of the following uses tickets to identify users to the network?

Select one of the following:

  • RADIUS

  • LDAP

  • TACACS+

  • Kerberos

Explanation

Question 5 of 50

1

Which of the following file transfer protocols is an extension of SSH Protocol Version 2.0?

Select one of the following:

  • FTP

  • TFTP

  • SFTP

  • FTPS

Explanation

Question 6 of 50

1

Due to sensitive data concerns, a security administrator has enacted a policy preventing the use of flash drives.
Additionally, which of the following can the administrator implement to reduce the risk of data leakage?

Select one of the following:

  • Enact a policy that all work files are to be password protected

  • Enact a policy banning users from bringing in personal music devices

  • Provide users with unencrypted storage devices that remain on-site

  • Disallow users from saving data to any network share

Explanation

Question 7 of 50

1

The security administrator implemented privacy screens, password protected screen savers, and hired a secure
shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
(Select TWO).

Select one or more of the following:

  • Whaling

  • Dumpster diving

  • Shoulder surfing

  • Tailgating

  • Impersonation

Explanation

Question 8 of 50

1

Performing routine security audits is a form of which of the following controls?

Select one of the following:

  • Preventive

  • Detective

  • Protective

  • Proactive

Explanation

Question 9 of 50

1

Which of the following web application security weaknesses can be mitigated by preventing the use of HTML
tags?

Select one of the following:

  • LDAP injection

  • SQL injection

  • Error and exception handling

  • Cross-site scripting

Explanation

Question 10 of 50

1

Which of the following access control technologies provides a rolling password for one-time use?

Select one of the following:

  • RSA tokens

  • ACL

  • Multifactor authentication

  • PIV card

Explanation

Question 11 of 50

1

Which of the following would be the BEST action to perform when conducting a corporate vulnerability
assessment?

Select one of the following:

  • Document scan results for the change control board

  • Organize data based on severity and asset value

  • Examine the vulnerability data using a network analyzer

  • Update antivirus signatures and apply patches

Explanation

Question 12 of 50

1

Which of the following would allow traffic to be redirected through a malicious machine by sending false
hardware address updates to a switch?

Select one of the following:

  • ARP poisoning

  • MAC spoofing

  • pWWN spoofing

  • DNS poisoning

Explanation

Question 13 of 50

1

Which of the following devices would be installed on a single computer to prevent intrusion?

Select one of the following:

  • Host intrusion detection

  • Network firewall

  • Host-based firewall

  • VPN concentrator

Explanation

Question 14 of 50

1

Which of the following is a policy that would force all users to organize their areas as well as help in reducing
the risk of possible data theft?

Select one of the following:

  • Password behaviors

  • Clean desk policy

  • Data handling

  • Data disposal

Explanation

Question 15 of 50

1

A penetration test shows that almost all database servers were able to be compromised through a default
database user account with the default password. Which of the following is MOST likely missing from the
operational procedures?

Select one of the following:

  • Application hardening

  • OS hardening

  • Application patch management

  • SQL injection

Explanation

Question 16 of 50

1

Isolation mode on an AP provides which of the following functionality types?

Select one of the following:

  • Segmentation of each wireless user from other wireless users

  • Disallows all users from communicating directly with the AP

  • Hides the service set identifier

  • Makes the router invisible to other routers

Explanation

Question 17 of 50

1

Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?

Select one of the following:

  • SSH

  • SCP

  • SFTP

  • SNMP

Explanation

Question 18 of 50

1

Which of the following is MOST likely to be the last rule contained on any firewall?

Select one of the following:

  • IP allow any any

  • Implicit deny

  • Separation of duties

  • Time of day restrictions

Explanation

Question 19 of 50

1

During the analysis of malicious code, a security analyst discovers JavaScript being used to send random data
to another service on the same system. This is MOST likely an example of which of the following?

Select one of the following:

  • Buffer overflow

  • XML injection

  • SQL injection

  • Distributed denial of service

Explanation

Question 20 of 50

1

Which of the following is true about hardware encryption? (Select TWO).

Select one or more of the following:

  • It must use elliptical curve encryption

  • It requires a HSM file system

  • It only works when data is not highly fragmented

  • It is faster than software encryption

  • It is available on computers using TPM

Explanation

Question 21 of 50

1

Which of the following is an example of verifying new software changes on a test system?

Select one of the following:

  • User access control

  • Patch management

  • Intrusion prevention

  • Application hardening

Explanation

Question 22 of 50

1

Which of the following is a technical control?

Select one of the following:

  • System security categorization requirement

  • Baseline configuration development

  • Contingency planning

  • Least privilege implementation

Explanation

Question 23 of 50

1

Public keys are used for which of the following?

Select one of the following:

  • Decrypting wireless messages

  • Decrypting the hash of an electronic signature

  • Bulk encryption of IP based email traffic

  • Encrypting web browser traffic

Explanation

Question 24 of 50

1

Which of the following penetration testing types is performed by security professionals with limited inside
knowledge of the network?

Select one of the following:

  • Passive vulnerability scan

  • Gray box

  • White box

  • Black box

Explanation

Question 25 of 50

1

Which of the following devices BEST allows a security administrator to identify malicious activity after it has
occurred?

Select one of the following:

  • Spam filter

  • IDS

  • Firewall

  • Malware inspection

Explanation

Question 26 of 50

1

Which of the following cloud computing concepts is BEST described as providing an Operating System on
which the customer can install your own applications or software on-demand ?

Select one of the following:

  • Platform as a Service

  • Software as a Service

  • Infrastructure as a Service

  • Trusted OS as a Service

Explanation

Question 27 of 50

1

A security administrator wants to prevent users in sales from accessing their servers after 6:00 p.m., and
prevent them from accessing accounting's network at all times. Which of the following should the administrator
implement to accomplish these goals? (Select TWO).

Select one or more of the following:

  • Separation of duties

  • Time of day restrictions

  • Access control lists

  • Mandatory access control

  • Single sign-on

Explanation

Question 28 of 50

1

Which of the following environmental controls would BEST be used to regulate cooling and flow of air within a
datacenter?

Select one of the following:

  • Fire suppression

  • Video monitoring

  • EMI shielding

  • Hot and cold aisles

Explanation

Question 29 of 50

1

Which of the following is used when performing a quantitative risk analysis?

Select one of the following:

  • Focus groups

  • Asset value

  • Surveys

  • Best practice

Explanation

Question 30 of 50

1

Which of the following BEST describes the function of TPM?

Select one of the following:

  • High speed secure removable storage device

  • Third party certificate trust authority

  • Hardware chip that stores encryption keys

  • A trusted OS model

Explanation

Question 31 of 50

1

Which of the following PKI implementation element is responsible for verifying the authenticity of certificate
contents?

Select one of the following:

  • CRL

  • Key escrow

  • Recovery agent

  • CA

Explanation

Question 32 of 50

1

Which of the following describes an active attempt to identify weaknesses?

Select one of the following:

  • Vulnerability scanning

  • Zero day attack

  • Port scanning

  • Penetration testing

Explanation

Question 33 of 50

1

The security administrator is getting reports from users that they are accessing certain websites and are unable
to download anything off of those sites. The security administrator is also receiving several alarms from the IDS
about suspicious traffic on the network. Which of the following is the MOST likely cause?

Select one of the following:

  • NIPS is blocking activities from those specific websites

  • NIDS is blocking activities from those specific websites

  • The firewall is blocking web activity

  • The router is denying all traffic from those sites

Explanation

Question 34 of 50

1

Which of the following should be enabled to ensure only certain wireless clients can access the network?

Select one of the following:

  • DHCP

  • SSID broadcast

  • MAC filtering

  • AP isolation

Explanation

Question 35 of 50

1

Which of the following is the BEST standard for encryption on a wireless network?

Select one of the following:

  • WPA2-PSK

  • AES

  • WPA

  • WEP

Explanation

Question 36 of 50

1

Which of the following would you educate your employees about in order to prevent them to become victim of
an attacker attempting to obtain bank account information?

Select one of the following:

  • Password complexity requirements

  • Phishing techniques

  • Handling PII

  • Tailgating techniques

Explanation

Question 37 of 50

1

If a user wishes to receive a file encrypted with PGP, the user must FIRST supply which of the following to the
person who wishes to securely send the file:

Select one of the following:

  • public key

  • recovery agent

  • key escrow account

  • private key

Explanation

Question 38 of 50

1

Which of the following is a reason to perform a penetration test?

Select one of the following:

  • To passively test security controls within the enterprise

  • To provide training to white hat attackers

  • To identify all vulnerabilities and weaknesses within the enterprise

  • To determine the potential impact of a threat against the enterprise

Explanation

Question 39 of 50

1

Which of the following methods BEST describes the use of hiding data within other files?

Select one of the following:

  • Digital signatures

  • PKI

  • Transport encryption

  • Steganography

Explanation

Question 40 of 50

1

Which of the following BEST describes the proper method and reason to implement port security?

Select one of the following:

  • Apply a security control which ties specific ports to end-device MAC addresses and prevents additional
    devices from being connected to the network

  • Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network

  • Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network

  • Apply a security control which ties specific ports to end-device IP addresses and prevents mobile devices from being connected to the network

Explanation

Question 41 of 50

1

Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an
email?

Select one of the following:

  • Exception handling

  • Adware

  • Cross-site request forgery

  • Cross-site scripting

Explanation

Question 42 of 50

1

Which of the following is MOST likely to result in a data loss or compromise?

Select one of the following:

  • Accounting transferring confidential staff details via SFTP to the payroll department

  • Back office staff accessing and updating details on the mainframe via SSH

  • Encrypted backup tapes left unattended at reception for offsite storage

  • Developers copying data from production to the test environments via a USB stick

Explanation

Question 43 of 50

1

A security administrator has discovered through a password auditing software that most passwords can be
discovered by cracking the first seven characters and then cracking the second part of the password. Which of
the following is in use by the company?

Select one of the following:

  • LANMAN

  • MD5

  • WEP

  • 3DES

Explanation

Question 44 of 50

1

Which of the following concepts ensures that the data is only viewable to authorized users?

Select one of the following:

  • Availability

  • Biometrics

  • Integrity

  • Confidentiality

Explanation

Question 45 of 50

1

Which of the following BEST describes an intrusion prevention system?

Select one of the following:

  • A system that stops an attack in progress

  • A system that allows an attack to be identified

  • A system that logs the attack for later analysis

  • A system that serves as a honeypot

Explanation

Question 46 of 50

1

A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that
was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their
wireless network breached last month. Which of the following is MOST likely causing the disconnections?

Select one of the following:

  • An attacker inside the company is performing a bluejacking attack on the user's laptop

  • Another user's Bluetooth device is causing interference with the Bluetooth on the laptop

  • The new access point was mis-configured and is interfering with another nearby access point

  • The attacker that breached the nearby company is in the parking lot implementing a war driving attack

Explanation

Question 47 of 50

1

Risk can be managed in the following ways EXCEPT:

Select one of the following:

  • mitigation

  • acceptance

  • elimination

  • transference

Explanation

Question 48 of 50

1

A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST
describes the required remediation action?

Select one of the following:

  • Change the server's SSL key and add the previous key to the CRL

  • Install a host-based firewall

  • Install missing security updates for the operating system

  • Add input validation to forms

Explanation

Question 49 of 50

1

While browsing the Internet, an administrator notices their browser behaves erratically, appears to download
something, and then crashes. Upon restarting the PC, the administrator notices performance is extremely slow
and there are hundreds of outbound connections to various websites. Which of the following BEST describes
what has occurred?

Select one of the following:

  • The PC has become part of a botnet

  • The PC has become infected with spyware

  • The PC has become a spam host

  • The PC has become infected with adware

Explanation

Question 50 of 50

1

Which of the following is a best practice when securing a switch from physical access?

Select one of the following:

  • Disable unnecessary accounts

  • Print baseline configuration

  • Enable access lists

  • Disable unused ports

Explanation