Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
SY0-501
Free trial
Verified
Question 176
A security engineer is faced with competing requirements from the networking group and database administrators. The database administrators would like ten application servers on the same subnet for ease of administration, whereas the networking group would like to segment all applications from one another.
Which of the following should the security administrator do to rectify this issue?
- A: Recommend performing a security assessment on each application, and only segment the applications with the most vulnerability
- B: Recommend classifying each application into like security groups and segmenting the groups from one another
- C: Recommend segmenting each application, as it is the most secure approach
- D: Recommend that only applications with minimal security features should be segmented to protect them
Question 177
A security analyst has been asked to perform a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members evaluate and provide critical feedback of another developer's code.
Which of the following assessment techniques is BEST described in the analyst's report?
- A: Architecture evaluation
- B: Baseline reporting
- C: Whitebox testing
- D: Peer review
Question 178
An attacker wearing a building maintenance uniform approached a company's receptionist asking for access to a secure area. The receptionist asks for identification, a building access badge and checks the company's list approved maintenance personnel prior to granting physical access to the secure are.
The controls used by the receptionist are in place to prevent which of the following types of attacks?
- A: Tailgating
- B: Shoulder surfing
- C: Impersonation
- D: Hoax
Question 179
A security administrator is tasked with conducting an assessment made to establish the baseline security posture of the corporate IT infrastructure. The assessment must report actual flaws and weaknesses in the infrastructure. Due to the expense of hiring outside consultants, the testing must be performed using in-house or cheaply available resource. There cannot be a possibility of any requirement being damaged in the test.
Which of the following has the administrator been tasked to perform?
- A: Risk transference
- B: Penetration test
- C: Threat assessment
- D: Vulnerability assessment
Question 180
A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine.
Which of the following describes the type of attack the proxy has been legitimately programmed to perform?
- A: Transitive access
- B: Spoofing
- C: Man-in-the-middle
- D: Replay
Question 181
Which of the following use the SSH protocol?
- A: Stelnet
- B: SCP
- C: SNMP
- D: FTPS
- E: SSL
- F: SFTP
Question 182
Which of the following is the GREATEST risk to a company by allowing employees to physically bring their personal smartphones to work?
- A: Taking pictures of proprietary information and equipment in restricted areas.
- B: Installing soft token software to connect to the company's wireless network.
- C: Company cannot automate patch management on personally-owned devices.
- D: Increases the attack surface by having more target devices on the company's campus
Question 183
Which of the following is the summary of loss for a given year?
- A: MTBF
- B: ALE
- C: SLA
- D: ARO
Question 184
A Security Officer on a military base needs to encrypt several smart phones that will be going into the field.
Which of the following encryption solutions should be deployed in this situation?
- A: Elliptic curve
- B: One-time pad
- C: 3DES
- D: AES-256
Question 185
An organization relies heavily on an application that has a high frequency of security updates. At present, the security team only updates the application on the first Monday of each month, even though the security updates are released as often as twice a week.
Which of the following would be the BEST method of updating this application?
- A: Configure testing and automate patch management for the application.
- B: Configure security control testing for the application.
- C: Manually apply updates for the application when they are released.
- D: Configure a sandbox for testing patches before the scheduled monthly update.
Question 186
Which of the following types of keys is found in a key escrow?
- A: Public
- B: Private
- C: Shared
- D: Session
Question 187
A technician must configure a firewall to block external DNS traffic from entering a network.
Which of the following ports should they block on the firewall?
- A: 53
- B: 110
- C: 143
- D: 443
Question 188
A software development company needs to share information between two remote servers, using encryption to protect it. A programmer suggests developing a new encryption protocol, arguing that using an unknown protocol with secure, existing cryptographic algorithm libraries will provide strong encryption without being susceptible to attacks on other known protocols.
Which of the following summarizes the BEST response to the programmer's proposal?
- A: The newly developed protocol will only be as secure as the underlying cryptographic algorithms used.
- B: New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries.
- C: A programmer should have specialized training in protocol development before attempting to design a new encryption protocol.
- D: The obscurity value of unproven protocols against attacks often outweighs the potential for introducing new vulnerabilities.
Question 189
A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.
Which of the following technologies would BEST be suited to accomplish this?
- A: Transport Encryption
- B: Stream Encryption
- C: Digital Signature
- D: Steganography
Question 190
A supervisor in your organization was demoted on Friday afternoon. The supervisor had the ability to modify the contents of a confidential database, as well as other managerial permissions. On Monday morning, the database administrator reported that log files indicated that several records were missing from the database.
Which of the following risk mitigation strategies should have been implemented when the supervisor was demoted?
- A: Incident management
- B: Routine auditing
- C: IT governance
- D: Monthly user rights reviews
Question 191
Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth?
- A: War chalking
- B: Bluejacking
- C: Bluesnarfing
- D: Rogue tethering
Question 192
Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe receives a response, he is unable to decrypt the response with the same key he used initially.
Which of the following would explain the situation?
- A: An ephemeral key was used for one of the messages
- B: A stream cipher was used for the initial email; a block cipher was used for the reply
- C: Out-of-band key exchange has taken place
- D: Asymmetric encryption is being used
Question 193
Recently several employees were victims of a phishing email that appeared to originate from the company president. The email claimed the employees would be disciplined if they did not click on a malicious link in the message.
Which of the following principles of social engineering made this attack successful?
- A: Authority
- B: Spamming
- C: Social proof
- D: Scarcity
Question 194
Which of the following is the LEAST secure hashing algorithm?
- A: SHA1
- B: RIPEMD
- C: MD5
- D: DES
Question 195
An employee uses RDP to connect back to the office network.
If RDP is misconfigured, which of the following security exposures would this lead to?
- A: A virus on the administrator's desktop would be able to sniff the administrator's username and password.
- B: Result in an attacker being able to phish the employee's username and password.
- C: A social engineering attack could occur, resulting in the employee's password being extracted.
- D: A man in the middle attack could occur, resulting the employee's username and password being captured.
Question 196
Joe, the security administrator, sees this in a vulnerability scan report:
"The server 10.1.2.232 is running Apache 2.2.20 which may be vulnerable to a mod_cgi exploit.`
Joe verifies that the mod_cgi module is not enabled on 10.1.2.232. This message is an example of:
- A: a threat.
- B: a risk.
- C: a false negative.
- D: a false positive.
Question 197
An auditor has identified an access control system that can incorrectly accept an access attempt from an unauthorized user. Which of the following authentication systems has the auditor reviewed?
- A: Password-based
- B: Biometric-based
- C: Location-based
- D: Certificate-based
Question 198
DRAG DROP -
Drag and drop the correct protocol to its default port.
Select and Place:
Question 199
The Chief Technology Officer (CTO) of a company, Ann, is putting together a hardware budget for the next 10 years. She is asking for the average lifespan of each hardware device so that she is able to calculate when she will have to replace each device.
Which of the following categories BEST describes what she is looking for?
- A: ALE
- B: MTTR
- C: MTBF
- D: MTTF
Question 200
A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the
Internet.
Which of the following should be used in the code? (Choose two.)
- A: Escrowed keys
- B: SSL symmetric encryption key
- C: Software code private key
- D: Remote server public key
- E: OCSP
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!