Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
SY0-501
Free trial
Verified
Question 101
A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?
- A: The vulnerability scanner is performing an authenticated scan.
- B: The vulnerability scanner is performing local file integrity checks.
- C: The vulnerability scanner is performing in network sniffer mode.
- D: The vulnerability scanner is performing banner grabbing.
Question 102
A development team has adopted a new approach to projects in which feedback is iterative and multiple iterations of deployments are provided within an application's full life cycle. Which of the following software development methodologies is the development team using?
- A: Waterfall
- B: Agile
- C: Rapid
- D: Extreme
Question 103
A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?
- A: Implement time-of-day restrictions.
- B: Audit file access times.
- C: Secretly install a hidden surveillance camera.
- D: Require swipe-card access to enter the lab.
Question 104
A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an
FTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists form the vendor.
Which of the following BEST describes the reason why the vulnerability exists?
- A: Default configuration
- B: End-of-life system
- C: Weak cipher suite
- D: Zero-day threats
Question 105
An organization uses SSO authentication for employee access to network resources. When an employee resigns, as per the organization's security policy, the employee's access to all network resources is terminated immediately. Two weeks later, the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server. Which of the following represents the BEST course of action?
- A: Approve the former employee's request, as a password reset would give the former employee access to only the human resources server.
- B: Deny the former employee's request, since the password reset request came from an external email address.
- C: Deny the former employee's request, as a password reset would give the employee access to all network resources.
- D: Approve the former employee's request, as there would not be a security issue with the former employee gaining access to network resources.
Question 106
Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping?
- A: Encrypt it with Joe's private key
- B: Encrypt it with Joe's public key
- C: Encrypt it with Ann's private key
- D: Encrypt it with Ann's public key
Question 107
A director of IR is reviewing a report regarding several recent breaches. The director compiles the following statistic's
-Initial IR engagement time frame
-Length of time before an executive management notice went out
-Average IR phase completion
The director wants to use the data to shorten the response time. Which of the following would accomplish this?
- A: CSIRT
- B: Containment phase
- C: Escalation notifications
- D: Tabletop exercise
Question 108
To reduce disk consumption, an organization's legal department has recently approved a new policy setting the data retention period for sent email at six months.
Which of the following is the BEST way to ensure this goal is met?
- A: Create a daily encrypted backup of the relevant emails.
- B: Configure the email server to delete the relevant emails.
- C: Migrate the relevant emails into an ג€Archivedג€ folder.
- D: Implement automatic disk compression on email servers.
Question 109
Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Choose two.)
- A: Rainbow table attacks greatly reduce compute cycles at attack time.
- B: Rainbow tables must include precomputed hashes.
- C: Rainbow table attacks do not require access to hashed passwords.
- D: Rainbow table attacks must be performed on the network.
- E: Rainbow table attacks bypass maximum failed login restrictions.
Question 110
A security administrator is configuring a new network segment, which contains devices that will be accessed by external users, such as web and FTP server.
Which of the following represents the MOST secure way to configure the new network segment?
- A: The segment should be placed on a separate VLAN, and the firewall rules should be configured to allow external traffic.
- B: The segment should be placed in the existing internal VLAN to allow internal traffic only.
- C: The segment should be placed on an intranet, and the firewall rules should be configured to allow external traffic.
- D: The segment should be placed on an extranet, and the firewall rules should be configured to allow both internal and external traffic.
Question 111
Which of the following types of attacks precedes the installation of a rootkit on a server?
- A: Pharming
- B: DDoS
- C: Privilege escalation
- D: DoS
Question 112
Which of the following cryptographic algorithms is irreversible?
- A: RC4
- B: SHA-256
- C: DES
- D: AES
Question 113
A security analyst receives an alert from a WAF with the following payload: var data= <test test test> ++ <../../../../../../etc/passwd>`
Which of the following types of attacks is this?
- A: Cross-site request forgery
- B: Buffer overflow
- C: SQL injection
- D: JavaScript data insertion
- E: Firewall evasion script
Question 114
A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred?
- A: The hacker used a race condition.
- B: The hacker used a pass-the-hash attack.
- C: The hacker-exploited improper key management.
- D: The hacker exploited weak switch configuration.
Question 115
Audit logs from a small company's vulnerability scanning software show the following findings:
Destinations scanned:
-Server001- Internal human resources payroll server
-Server101-Internet-facing web server
-Server201- SQL server for Server101
-Server301-Jumpbox used by systems administrators accessible from the internal network
Validated vulnerabilities found:
-Server001- Vulnerable to buffer overflow exploit that may allow attackers to install software
-Server101- Vulnerable to buffer overflow exploit that may allow attackers to install software
-Server201-OS updates not fully current
-Server301- Accessible from internal network without the use of jumpbox
-Server301-Vulnerable to highly publicized exploit that can elevate user privileges
Assuming external attackers who are gaining unauthorized information are of the highest concern, which of the following servers should be addressed FIRST?
- A: Server001
- B: Server101
- C: Server201
- D: Server301
Question 116
A security analyst wants to harden the company's VoIP PBX. The analyst is worried that credentials may be intercepted and compromised when IP phones authenticate with the BPX. Which of the following would best prevent this from occurring?
- A: Implement SRTP between the phones and the PBX.
- B: Place the phones and PBX in their own VLAN.
- C: Restrict the phone connections to the PBX.
- D: Require SIPS on connections to the PBX.
Question 117
An organization is comparing and contrasting migration from its standard desktop configuration to the newest version of the platform. Before this can happen, the
Chief Information Security Officer (CISO) voices the need to evaluate the functionality of the newer desktop platform to ensure interoperability with existing software in use by the organization. In which of the following principles of architecture and design is the CISO engaging?
- A: Dynamic analysis
- B: Change management
- C: Baselining
- D: Waterfalling
Question 118
A security administrator suspects a MITM attack aimed at impersonating the default gateway is underway. Which of the following tools should the administrator use to detect this attack? (Choose two.)
- A: Ping
- B: Ipconfig
- C: Tracert
- D: Netstat
- E: Dig
- F: Nslookup
Question 119
A user is presented with the following items during the new-hire onboarding process:
-Laptop
-Secure USB drive
-Hardware OTP token
-External high-capacity HDD
-Password complexity policy
-Acceptable use policy
-HASP key
-Cable lock
Which of the following is one component of multifactor authentication?
- A: Secure USB drive
- B: Cable lock
- C: Hardware OTP token
- D: HASP key
Question 120
Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?
- A: Error handling to protect against program exploitation
- B: Exception handling to protect against XSRF attacks.
- C: Input validation to protect against SQL injection.
- D: Padding to protect against string buffer overflows.
Question 121
An organization requires users to provide their fingerprints to access an application. To improve security, the application developers intend to implement multifactor authentication. Which of the following should be implemented?
- A: Use a camera for facial recognition
- B: Have users sign their name naturally
- C: Require a palm geometry scan
- D: Implement iris recognition
Question 122
A network technician is setting up a segmented network that will utilize a separate ISP to provide wireless access to the public area for a company. Which of the following wireless security methods should the technician implement to provide basic accountability for access to the public network?
- A: Pre-shared key
- B: Enterprise
- C: Wi-Fi Protected setup
- D: Captive portal
Question 123
After a routine audit, a company discovers that engineering documents have been leaving the network on a particular port. The company must allow outbound traffic on this port, as it has a legitimate business use. Blocking the port would cause an outage. Which of the following technology controls should the company implement?
- A: NAC
- B: Web proxy
- C: DLP
- D: ACL
Question 124
A security analyst has received the following alert snippet from the HIDS appliance:
Given the above logs, which of the following is the cause of the attack?
- A: The TCP ports on destination are all open
- B: FIN, URG, and PSH flags are set in the packet header
- C: TCP MSS is configured improperly
- D: There is improper Layer 2 segmentation
Question 125
A security analyst reviews the following output:
The analyst loads the hash into the SIEM to discover if this hash is seen in other parts of the network. After inspecting a large number of files, the security analyst reports the following:
Which of the following is the MOST likely cause of the hash being found in other areas?
- A: Jan Smith is an insider threat
- B: There are MD5 hash collisions
- C: The file is encrypted
- D: Shadow copies are present
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!