Practice Test Flashcards
802.1Q
Standard for virtual lans
A sniffer is also known as a
protocol analyzer, but an analyzer analyzes and a sniffer doesn’t
Administrative controls
train personnel on security policies
deterrent controls
stop an attacker from attacking in the first place
detective controls
identify an attack in progress
preventive controls
stop an attack before it can cause damage
warm site
Dormant or performs non critical function, ready to be adapted to critical
cold site
has power and network hookups, think warehouse
hot site
fully configured alternative network
three major steps in a continuity of operations plan
audit mitigate and recover
which term is correct, risk assessment or risk analysis?
Risk assessment
periodic control testing
Best way to check effectiveness of safety measures
DNS Poisoning
redirects a domain name to a malicious IP address
DNS hijacking
setting up a fake DNS server
802.1x is a port-based authentication mechanism T or F
True
802.1x works over a LAN, a Wireless Lan, or both
both
hardware security module
cryptoprocessor device attached to servers and computers to provide digital key security
TPM
creates a secure computing environment with cryptoprocessors
Mandatory Access Control
Assigns a security level for users and resources, and the two much “match.”
Transitive Authentication is also known as
single sign on
Discretionary Access control is managed by
Access control lists
TOTP
Time-based one time password
Chap is deprecated because it
uses MD5
HMAC
Hash message authentication code - uses hash and key
PBKDF2 is what?
A key and/or password stretching algorith
Bcrypt is what?
password stretching algorithm
ISA stands for
Interconnection Security Agreement
Radius is used for
wireless. Remote Authentication dial in user service
Mac
Mandatory Access control, restricted, public, private etc
DAC
Discretionary access control - based on object ownership
SFTP uses port
22
VSAN
virtual storage area network, similar to vlan in segmentation ability
Trusted Platform Module uses what key
storage root key
What is a TPM
Trusted Platform Module, chip that stores RSA keys and uses hardware encryption
Stages of common incident response
d
ale
s
sle
s
aro
s
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic? A. Sniffer B. Router C. Firewall D. Switch
c. Firewall
QUESTION NO: 11 Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task? A. HIDS B. Firewall C. NIPS D.
Spam filter
c nips
QUESTION NO: 12 Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network? A. HIPS on each virtual machine B. NIPS on the network C. NIDS on the network D. HIDS on each virtual machine
Answer: A
Explanation:
Host-based intrusion prevention system (HIPS) is an installed software package which monitors a
single host for suspicious activity by analyzing events occurring within that host.
QUESTION NO: 21 Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites? A. Spam filter B. URL filter C. Content inspection D. Malware inspection
B.
URL filter
QUESTION NO: 25
Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a
page is displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking Pete’s access to this site? A. Internet content filter B. Firewall C. Proxy server D. Protocol analyzer
A.
Internet content filter
A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HOST: localhost
Accept: */* Referrer: http://localhost/ ******* HTTP/1.1 403 Forbidden Connection: close Log: Access denied with 403. Pattern matches form bypass Which of the following technologies was MOST likely being used to generate this log? A. Host-based Intrusion Detection System B. Web application firewall C. Network-based Intrusion Detection System D. Stateful Inspection Firewall E. URL Content Filter
B.
Web application firewall
QUESTION NO: 30
An administrator would like to review the effectiveness of existing security in the enterprise. Which
of the following would be the BEST place to start?
A.
Review past security incidents and their resolution
B.
Comptia SY0-401 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 21
Rewrite the existing security policy
C.
Implement an intrusion prevention system
D.
Install honey pot systems
C.
Implement an intrusion prevention system
SCP uses TCP/UDP or both
TCP
TFTP uses TCP/UDP or both
UDP
A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another? A. Implement a virtual firewall B. Install HIPS on each VM C. Virtual switches with VLANs D. Develop a patch management guide
C.
Virtual switches with VLANs
A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet
interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks.
Which of the following is MOST likely the reason for the sub-interfaces?
A.
The network uses the subnet of 255.255.255.128.
B.
The switch has several VLANs configured on it.
C.
The sub-interfaces are configured for VoIP traffic.
Comptia SY0-401 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 31
D.
The sub-interfaces each implement quality of service.
b
A company determines a need for additional protection from rogue devices plugging into physical ports around the building. Which of the following provides the highest degree of protection from unauthorized wired network access? A. Intrusion Prevention Systems B. MAC filtering C. Flood guards D. 802.1x
D.
802.1x
QUESTION NO: 48
A network administrator wants to block both DNS requests and zone transfers coming from
outside IP addresses. The company uses a firewall which implements an implicit allow and is
currently configured with the following ACL applied to its external interface.
PERMIT TCP ANY ANY 80
PERMIT TCP ANY ANY 443
Which of the following rules would accomplish this task? (Select TWO).
A.
Change the firewall default settings so that it implements an implicit deny
B.
Apply the current ACL to all interfaces of the firewall
C.
Remove the current ACL
D.
Add the following ACL at the top of the current ACLDENY TCP ANY ANY 53
E.
Add the following ACL at the bottom of the current ACLDENY ICMP ANY ANY 53
F.
Add the following ACL at the bottom of the current ACLDENY IP ANY ANY 53
Answer: A,F
QUESTION NO: 50
The Human Resources department has a parent shared folder setup on the server. There are two
groups that have access, one called managers and one called staff. There are many sub folders
under the parent shared folder, one is called payroll. The parent folder access control list
propagates all subfolders and all subfolders inherit the parent permission. Which of the following is
the quickest way to prevent the staff group from gaining access to the payroll folder?
A.
Remove the staff group from the payroll folder
B.
Implicit deny on the payroll folder for the staff group
C.
Implicit deny on the payroll folder for the managers group
D.
Remove inheritance from the payroll folder
B.
Implicit deny on the payroll folder for the staff group
A company has several conference rooms with wired network jacks that are used by both
employees and guests. Employees need access to internal resources and guests only need
access to the Internet. Which of the following combinations is BEST to meet the requirements?
A.
NAT and DMZ
B.
VPN and IPSec
C.
Switches and a firewall
D.
802.1x and VLANs
D.
802.1x and VLANs
A security administrator is segregating all web-facing server traffic from the internal network and restricting it to a single interface on a firewall. Which of the following BEST describes this new network? A. VLAN B. Subnet C. VPN D. DMZ
D.
DMZ
When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes. Which of the following design elements would be implemented to comply with the security administrator’s request? A. DMZ B. Cloud services C. Comptia SY0-401 Exam "Pass Any Exam. Any Time." - www.actualtests.com 47 Virtualization D. Sandboxing Answer: A Explanation: A
A.
DMZ
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO). A. 10.4.4.125 B. 10.4.4.158 C. 10.4.4.165 D. 10.4.4.189 E. 10.4.4.199
Answer: C,D
Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains? Server 1: 192.168.100.6 Server 2: 192.168.100.9 Server 3: 192.169.100.20 A. /24 B. /27 C. /28 D. /29 E. /30
D.
/29
A small company can only afford to buy an all-in-one wireless router/switch. The company has 3
wireless BYOD users and 2 web servers without wireless access. Which of the following should
the company configure to protect the servers from the user devices? (Select TWO).
A.
Deny incoming connections to the outside router interface.
B.
Change the default HTTP port
C.
Implement EAP-TLS to establish mutual authentication
D.
Disable the physical switch ports
E.
Create a server VLAN
F.
Create an ACL to access the server
e,f
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic? A. Connect the WAP to a different switch. B. Create a voice VLAN. C. Create a DMZ. D. Set the switch ports to 802.1q mode.
B.
Create a voice VLAN.
Which of the following is a programming interface that allows a remote computer to run programs on a local machine? A. RPC B. RSH C. SSH Comptia SY0-401 Exam "Pass Any Exam. Any Time." - www.actualtests.com 58 D. SSL
A.
RPC
remote procedure call
A company’s business model was changed to provide more web presence and now its ERM
software is no longer able to support the security needs of the company. The current data center
will continue to provide network and security services. Which of the following network elements
would be used to support the new business model?
A.
Software as a Service
B.
DMZ
C.
Remote access support
D.
Infrastructure as a Service
A.
Software as a Service
An IT director is looking to reduce the footprint of their company’s server environment. They have
decided to move several internally developed software applications to an alternate environment,
supported by an external company. Which of the following BEST describes this arrangement?
A.
Infrastructure as a Service
B.
Storage as a Service
C.
Platform as a Service
D.
Software as a Service
Answer: A
A company’s legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO). A. IPv6 B. SFTP C. IPSec D. SSH E. IPv4
Answer: A,C
Bind is what?
DNS