Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
SY0-501
Free trial
Verified
Question 201
A security guard has informed the Chief Information Security Officer that a person with a tablet has been walking around the building. The guard also noticed strange white markings in different areas of the parking lot.
The person is attempting which of the following types of attacks?
- A: Jamming
- B: War chalking
- C: Packet sniffing
- D: Near field communication
Question 202
A system administrator is configuring a site-to-site VPN tunnel.
Which of the following should be configured on the VPN concentrator during the IKE phase?
- A: RIPEMD
- B: ECDHE
- C: Diffie-Hellman
- D: HTTPS
Question 203
A network operations manager has added a second row of server racks in the datacenter. These racks face the opposite direction of the first row of racks.
Which of the following is the reason the manager installed the racks this way?
- A: To lower energy consumption by sharing power outlets
- B: To create environmental hot and cold isles
- C: To eliminate the potential for electromagnetic interference
- D: To maximize fire suppression capabilities
Question 204
Phishing emails frequently take advantage of high-profile catastrophes reported in the news.
Which of the following principles BEST describes the weakness being exploited?
- A: Intimidation
- B: Scarcity
- C: Authority
- D: Social proof
Question 205
New magnetic locks were ordered for an entire building. In accordance with company policy, employee safety is the top priority.
In case of a fire where electricity is cut, which of the following should be taken into consideration when installing the new locks?
- A: Fail safe
- B: Fault tolerance
- C: Fail secure
- D: Redundancy
Question 206
Anne, the Chief Executive Officer (CEO), has reported that she is getting multiple telephone calls from someone claiming to be from the helpdesk. The caller is asking to verify her network authentication credentials because her computer is broadcasting across the network.
This is MOST likely which of the following types of attacks?
- A: Vishing
- B: Impersonation
- C: Spim
- D: Scareware
Question 207
Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Choose two.)
- A: Password expiration
- B: Password length
- C: Password complexity
- D: Password history
- E: Password lockout
Question 208
An administrator discovers the following log entry on a server:
Nov 12 2013 00:23:45 httpd[2342]: GET
/app2/prod/proc/process.php?input=change;cd%20../../../etc;cat%20shadow
Which of the following attacks is being attempted?
- A: Command injection
- B: Password attack
- C: Buffer overflow
- D: Cross-site scripting
Question 209
A security team wants to establish an Incident Response plan. The team has never experienced an incident.
Which of the following would BEST help them establish plans and procedures?
- A: Table top exercises
- B: Lessons learned
- C: Escalation procedures
- D: Recovery procedures
That’s the end of your free questions
You’ve reached the preview limit for SY0-501Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!