Brooks Thornhill
Quiz por , criado more than 1 year ago

Questions 51-100

20
0
0
Brooks Thornhill
Criado por Brooks Thornhill quase 8 anos atrás
Fechar

SY0-301 Part 2

Questão 1 de 50

1

Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of
data making it susceptible to brute force attacks?

Selecione uma das seguintes:

  • PAP

  • NTLMv2

  • LANMAN

  • CHAP

Explicação

Questão 2 de 50

1

Which of the following should be used to help prevent device theft of unused assets?

Selecione uma das seguintes:

  • HSM device

  • Locking cabinet

  • Device encryption

  • GPS tracking

Explicação

Questão 3 de 50

1

Which of the following security practices should occur initially in software development?

Selecione uma das seguintes:

  • Secure code review

  • Patch management

  • Fuzzing

  • Penetration tests

Explicação

Questão 4 de 50

1

Which of the following uses tickets to identify users to the network?

Selecione uma das seguintes:

  • RADIUS

  • LDAP

  • TACACS+

  • Kerberos

Explicação

Questão 5 de 50

1

Which of the following file transfer protocols is an extension of SSH Protocol Version 2.0?

Selecione uma das seguintes:

  • FTP

  • TFTP

  • SFTP

  • FTPS

Explicação

Questão 6 de 50

1

Due to sensitive data concerns, a security administrator has enacted a policy preventing the use of flash drives.
Additionally, which of the following can the administrator implement to reduce the risk of data leakage?

Selecione uma das seguintes:

  • Enact a policy that all work files are to be password protected

  • Enact a policy banning users from bringing in personal music devices

  • Provide users with unencrypted storage devices that remain on-site

  • Disallow users from saving data to any network share

Explicação

Questão 7 de 50

1

The security administrator implemented privacy screens, password protected screen savers, and hired a secure
shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
(Select TWO).

Selecione uma ou mais das seguintes:

  • Whaling

  • Dumpster diving

  • Shoulder surfing

  • Tailgating

  • Impersonation

Explicação

Questão 8 de 50

1

Performing routine security audits is a form of which of the following controls?

Selecione uma das seguintes:

  • Preventive

  • Detective

  • Protective

  • Proactive

Explicação

Questão 9 de 50

1

Which of the following web application security weaknesses can be mitigated by preventing the use of HTML
tags?

Selecione uma das seguintes:

  • LDAP injection

  • SQL injection

  • Error and exception handling

  • Cross-site scripting

Explicação

Questão 10 de 50

1

Which of the following access control technologies provides a rolling password for one-time use?

Selecione uma das seguintes:

  • RSA tokens

  • ACL

  • Multifactor authentication

  • PIV card

Explicação

Questão 11 de 50

1

Which of the following would be the BEST action to perform when conducting a corporate vulnerability
assessment?

Selecione uma das seguintes:

  • Document scan results for the change control board

  • Organize data based on severity and asset value

  • Examine the vulnerability data using a network analyzer

  • Update antivirus signatures and apply patches

Explicação

Questão 12 de 50

1

Which of the following would allow traffic to be redirected through a malicious machine by sending false
hardware address updates to a switch?

Selecione uma das seguintes:

  • ARP poisoning

  • MAC spoofing

  • pWWN spoofing

  • DNS poisoning

Explicação

Questão 13 de 50

1

Which of the following devices would be installed on a single computer to prevent intrusion?

Selecione uma das seguintes:

  • Host intrusion detection

  • Network firewall

  • Host-based firewall

  • VPN concentrator

Explicação

Questão 14 de 50

1

Which of the following is a policy that would force all users to organize their areas as well as help in reducing
the risk of possible data theft?

Selecione uma das seguintes:

  • Password behaviors

  • Clean desk policy

  • Data handling

  • Data disposal

Explicação

Questão 15 de 50

1

A penetration test shows that almost all database servers were able to be compromised through a default
database user account with the default password. Which of the following is MOST likely missing from the
operational procedures?

Selecione uma das seguintes:

  • Application hardening

  • OS hardening

  • Application patch management

  • SQL injection

Explicação

Questão 16 de 50

1

Isolation mode on an AP provides which of the following functionality types?

Selecione uma das seguintes:

  • Segmentation of each wireless user from other wireless users

  • Disallows all users from communicating directly with the AP

  • Hides the service set identifier

  • Makes the router invisible to other routers

Explicação

Questão 17 de 50

1

Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?

Selecione uma das seguintes:

  • SSH

  • SCP

  • SFTP

  • SNMP

Explicação

Questão 18 de 50

1

Which of the following is MOST likely to be the last rule contained on any firewall?

Selecione uma das seguintes:

  • IP allow any any

  • Implicit deny

  • Separation of duties

  • Time of day restrictions

Explicação

Questão 19 de 50

1

During the analysis of malicious code, a security analyst discovers JavaScript being used to send random data
to another service on the same system. This is MOST likely an example of which of the following?

Selecione uma das seguintes:

  • Buffer overflow

  • XML injection

  • SQL injection

  • Distributed denial of service

Explicação

Questão 20 de 50

1

Which of the following is true about hardware encryption? (Select TWO).

Selecione uma ou mais das seguintes:

  • It must use elliptical curve encryption

  • It requires a HSM file system

  • It only works when data is not highly fragmented

  • It is faster than software encryption

  • It is available on computers using TPM

Explicação

Questão 21 de 50

1

Which of the following is an example of verifying new software changes on a test system?

Selecione uma das seguintes:

  • User access control

  • Patch management

  • Intrusion prevention

  • Application hardening

Explicação

Questão 22 de 50

1

Which of the following is a technical control?

Selecione uma das seguintes:

  • System security categorization requirement

  • Baseline configuration development

  • Contingency planning

  • Least privilege implementation

Explicação

Questão 23 de 50

1

Public keys are used for which of the following?

Selecione uma das seguintes:

  • Decrypting wireless messages

  • Decrypting the hash of an electronic signature

  • Bulk encryption of IP based email traffic

  • Encrypting web browser traffic

Explicação

Questão 24 de 50

1

Which of the following penetration testing types is performed by security professionals with limited inside
knowledge of the network?

Selecione uma das seguintes:

  • Passive vulnerability scan

  • Gray box

  • White box

  • Black box

Explicação

Questão 25 de 50

1

Which of the following devices BEST allows a security administrator to identify malicious activity after it has
occurred?

Selecione uma das seguintes:

  • Spam filter

  • IDS

  • Firewall

  • Malware inspection

Explicação

Questão 26 de 50

1

Which of the following cloud computing concepts is BEST described as providing an Operating System on
which the customer can install your own applications or software on-demand ?

Selecione uma das seguintes:

  • Platform as a Service

  • Software as a Service

  • Infrastructure as a Service

  • Trusted OS as a Service

Explicação

Questão 27 de 50

1

A security administrator wants to prevent users in sales from accessing their servers after 6:00 p.m., and
prevent them from accessing accounting's network at all times. Which of the following should the administrator
implement to accomplish these goals? (Select TWO).

Selecione uma ou mais das seguintes:

  • Separation of duties

  • Time of day restrictions

  • Access control lists

  • Mandatory access control

  • Single sign-on

Explicação

Questão 28 de 50

1

Which of the following environmental controls would BEST be used to regulate cooling and flow of air within a
datacenter?

Selecione uma das seguintes:

  • Fire suppression

  • Video monitoring

  • EMI shielding

  • Hot and cold aisles

Explicação

Questão 29 de 50

1

Which of the following is used when performing a quantitative risk analysis?

Selecione uma das seguintes:

  • Focus groups

  • Asset value

  • Surveys

  • Best practice

Explicação

Questão 30 de 50

1

Which of the following BEST describes the function of TPM?

Selecione uma das seguintes:

  • High speed secure removable storage device

  • Third party certificate trust authority

  • Hardware chip that stores encryption keys

  • A trusted OS model

Explicação

Questão 31 de 50

1

Which of the following PKI implementation element is responsible for verifying the authenticity of certificate
contents?

Selecione uma das seguintes:

  • CRL

  • Key escrow

  • Recovery agent

  • CA

Explicação

Questão 32 de 50

1

Which of the following describes an active attempt to identify weaknesses?

Selecione uma das seguintes:

  • Vulnerability scanning

  • Zero day attack

  • Port scanning

  • Penetration testing

Explicação

Questão 33 de 50

1

The security administrator is getting reports from users that they are accessing certain websites and are unable
to download anything off of those sites. The security administrator is also receiving several alarms from the IDS
about suspicious traffic on the network. Which of the following is the MOST likely cause?

Selecione uma das seguintes:

  • NIPS is blocking activities from those specific websites

  • NIDS is blocking activities from those specific websites

  • The firewall is blocking web activity

  • The router is denying all traffic from those sites

Explicação

Questão 34 de 50

1

Which of the following should be enabled to ensure only certain wireless clients can access the network?

Selecione uma das seguintes:

  • DHCP

  • SSID broadcast

  • MAC filtering

  • AP isolation

Explicação

Questão 35 de 50

1

Which of the following is the BEST standard for encryption on a wireless network?

Selecione uma das seguintes:

  • WPA2-PSK

  • AES

  • WPA

  • WEP

Explicação

Questão 36 de 50

1

Which of the following would you educate your employees about in order to prevent them to become victim of
an attacker attempting to obtain bank account information?

Selecione uma das seguintes:

  • Password complexity requirements

  • Phishing techniques

  • Handling PII

  • Tailgating techniques

Explicação

Questão 37 de 50

1

If a user wishes to receive a file encrypted with PGP, the user must FIRST supply which of the following to the
person who wishes to securely send the file:

Selecione uma das seguintes:

  • public key

  • recovery agent

  • key escrow account

  • private key

Explicação

Questão 38 de 50

1

Which of the following is a reason to perform a penetration test?

Selecione uma das seguintes:

  • To passively test security controls within the enterprise

  • To provide training to white hat attackers

  • To identify all vulnerabilities and weaknesses within the enterprise

  • To determine the potential impact of a threat against the enterprise

Explicação

Questão 39 de 50

1

Which of the following methods BEST describes the use of hiding data within other files?

Selecione uma das seguintes:

  • Digital signatures

  • PKI

  • Transport encryption

  • Steganography

Explicação

Questão 40 de 50

1

Which of the following BEST describes the proper method and reason to implement port security?

Selecione uma das seguintes:

  • Apply a security control which ties specific ports to end-device MAC addresses and prevents additional
    devices from being connected to the network

  • Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network

  • Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network

  • Apply a security control which ties specific ports to end-device IP addresses and prevents mobile devices from being connected to the network

Explicação

Questão 41 de 50

1

Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an
email?

Selecione uma das seguintes:

  • Exception handling

  • Adware

  • Cross-site request forgery

  • Cross-site scripting

Explicação

Questão 42 de 50

1

Which of the following is MOST likely to result in a data loss or compromise?

Selecione uma das seguintes:

  • Accounting transferring confidential staff details via SFTP to the payroll department

  • Back office staff accessing and updating details on the mainframe via SSH

  • Encrypted backup tapes left unattended at reception for offsite storage

  • Developers copying data from production to the test environments via a USB stick

Explicação

Questão 43 de 50

1

A security administrator has discovered through a password auditing software that most passwords can be
discovered by cracking the first seven characters and then cracking the second part of the password. Which of
the following is in use by the company?

Selecione uma das seguintes:

  • LANMAN

  • MD5

  • WEP

  • 3DES

Explicação

Questão 44 de 50

1

Which of the following concepts ensures that the data is only viewable to authorized users?

Selecione uma das seguintes:

  • Availability

  • Biometrics

  • Integrity

  • Confidentiality

Explicação

Questão 45 de 50

1

Which of the following BEST describes an intrusion prevention system?

Selecione uma das seguintes:

  • A system that stops an attack in progress

  • A system that allows an attack to be identified

  • A system that logs the attack for later analysis

  • A system that serves as a honeypot

Explicação

Questão 46 de 50

1

A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that
was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their
wireless network breached last month. Which of the following is MOST likely causing the disconnections?

Selecione uma das seguintes:

  • An attacker inside the company is performing a bluejacking attack on the user's laptop

  • Another user's Bluetooth device is causing interference with the Bluetooth on the laptop

  • The new access point was mis-configured and is interfering with another nearby access point

  • The attacker that breached the nearby company is in the parking lot implementing a war driving attack

Explicação

Questão 47 de 50

1

Risk can be managed in the following ways EXCEPT:

Selecione uma das seguintes:

  • mitigation

  • acceptance

  • elimination

  • transference

Explicação

Questão 48 de 50

1

A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST
describes the required remediation action?

Selecione uma das seguintes:

  • Change the server's SSL key and add the previous key to the CRL

  • Install a host-based firewall

  • Install missing security updates for the operating system

  • Add input validation to forms

Explicação

Questão 49 de 50

1

While browsing the Internet, an administrator notices their browser behaves erratically, appears to download
something, and then crashes. Upon restarting the PC, the administrator notices performance is extremely slow
and there are hundreds of outbound connections to various websites. Which of the following BEST describes
what has occurred?

Selecione uma das seguintes:

  • The PC has become part of a botnet

  • The PC has become infected with spyware

  • The PC has become a spam host

  • The PC has become infected with adware

Explicação

Questão 50 de 50

1

Which of the following is a best practice when securing a switch from physical access?

Selecione uma das seguintes:

  • Disable unnecessary accounts

  • Print baseline configuration

  • Enable access lists

  • Disable unused ports

Explicação