security+ 501 Flashcards
A security analyst wishes to increase the security of an FTP server. Currently, all trails to the FTP server is
unencrypted. Users connecting to the FTP server use a variety of modem FTP client software. The security
analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of
the following would BEST accomplish these goals?
A. Require the SFTP protocol to connect to the file server.
B. Use implicit TLS on the FTP server.
C. Use explicit FTPS for the connections.
D. Use SSH tunneling to encrypt the FTP traffic.
C
A company has three divisions, each with its own networks and services. The company decides to make its
secure web portal accessible to all employees utilizing their existing usernames and passwords, The security
administrator has elected to use SAML to support authentication. In this scenario, which of the following will
occur when users try to authenticate to the portal? (Select TWO)
A. The portal will function as an identity provider and issue an authentication assertion
B. The portal will request an authentication ticket from each network that is transitively trusted
C. he back-end networks will function as an identity provider and issue an authentication assertion
D. The back-end networks will request authentication tickets from the portal, which will act as the third-party
service provider authentication store E. F. The back-end networks will verify the assertion token issued by
the portal functioning as the identity provider
C
Which of the following would a security specialist be able to determine upon examination of a server’s
certificate?
A. CA public key
B. Server private key
C. CSR
D. OID
A
A user suspects someone has been accessing a home network without permission by spoofing the MAC
address of an authorized system While attempting to determine if an unauthorized user is togged into the home
network, the user reviews the wireless router, which shows the following table for systems that are currently on
the home network.
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
A. Apply MAC filtering and see if the router drops any of the systems.
B. Physically check each of the authorized systems to determine if they are togged onto the network.
C. Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this host.
D. Conduct a ping sweep of each of the authorized systems and see if an echo response is received.
C
A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the
default driver and print settings. Which of the following is the MOST likely risk in this situation?
A. An attacker can access and change the printer configuration.
B. SNMP data leaving the printer will not be properly encrypted.
C. An MITM attack can reveal sensitive information.
D. An attacker can easily inject malicious code into the printer firmware.
E. Attackers can use the PCL protocol to bypass the firewall of client computers.
A
A security analyst is hardening a server with the directory services role installed. The analyst must ensure
LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the
following should the analyst implement to meet these requirements? (Select TWO).
A. Generate an X 509-complaint certificate that is signed by a trusted CA.
B. Install and configure an SSH tunnel on the LDAP server.
C. Ensure port 389 is open between the clients and the servers using the communication.
D. Ensure port 636 is open between the clients and the servers using the communication.
E. Remove the LDAP directory service role from the server.
AD
A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS
attack News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to
the website that crashed. To which of the following categories does the refrigerator belong?
A. SoC
B. ICS
C. IoT
D. MFD
C
A user has attempted to access data at a higher classification level than the user’s account is currency
authorized to access. Which of the following access control models has been applied to this user’s account?
A. MAC
B. DAC
C. RBAC
D. ABAC
A
A company determines that it is prohibitively expensive to become compliant with new credit card regulations.
Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the
following is the company doing?
A. Transferring the risk
B. Accepting the risk
C. Avoiding the risk
D. Mitigating the risk
A
An organization has determined it can tolerate a maximum of three hours of downtime.
Which of the following has been specified?
A. RTO
B. RPO
C. MTBF
D. MTTR
A
An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the
future, impact of similar incidents. Which of the following would assist Company.com with its goal?
A. Certificate pinning
B. Certificate stapling
C. Certificate chaining
D. Certificate with extended validation
B
After a user reports stow computer performance, a systems administrator detects a suspicious file, which was
installed as part of a freeware software package. The systems administrator reviews the output below:
C:\WINDOWS\SYSTEM32\netstat -nab
Active Connections
Proto Local Address Foreign addr State
TCP 192.168.10.5000 10.37.213.20 Established
UDP 192.168.1.10.1900 .
Based on the above information, which of the following types of malware was installed on the user’s computer?
A. RAT B. Keylogger C. Spyware D. Worm E. Bot
A
A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly
at the slightest provocation. Which of the following types of controls does this BEST describe?
A. Deterent
B. Preventive
C. Detective
D. Compensating
A
An application team is performing a load-balancing test for a critical application during off- hours and has
requested access to the load balancer to review. Which servers are up without having the administrator on call.
The security analyst is hesitant to give the application team full access due to other critical applications running
on the road balancer. Which of the following is the BEST solution for the security analyst to process the
request?
A. Give the application team administrator access during off hours
B. Disable other critical applications before granting the team access.
C. Give the application team read-only access
D. Share the account with the application team
A
An auditor wants to test the security posture of an organization by running a tool that will display the following:
JIMS <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
JIMS <00> UNIQUE Registered
Which of the following commands should be used?
A. nbtstat
B. nc
C. arp
D. ipconfig
A
Which of the following attacks specifically impacts data availability?
A. DDoS
B. Trojan
C. MITM
D. Rootkit
A
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be
configured when connecting to WPA2-PSK?
A. DES
B. AES
C. MD5
D. WEP
B
An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent
with a malware infection. Which of the following steps should the responder perform NEXT?
A. Capture and document necessary information to assist in the response
B. Request the user capture and provide a screenshot or recording of the symptoms
C. Use a remote desktop client to collect and analyze the malware m real time
D. Ask the user to back up files for later recovery
A
An analyst wants to implement a more secure wireless authentication for office access points. Which of the
following technologies allows for encrypted authentication of wireless clients over TLS?
A. PEAP
B. EAP
C. WPA2
D. RADIUS
A
A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is
mutual authentication and delegation. Given these requirements, which of the following technologies should the
analyst recommend and configure?
A. Kerberos services
B. NTLM services
C. CHAP services
D. EAP-TLS
D
An organization wishes to provide better security for its name resolution services. Which of the following
technologies BEST supports the deployment DNSSEC at the organization?
A. TPM
B. TLS
C. SSL
D. PW
B
Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device,
including:
· Slow performance
· Word documents, PDFs, and images no longer opening
· A pop-up
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the
invoice, she had to click several security warnings to view it in her word processor. With which of the following
is the device MOST likely infected?
A. Crypto-malware
B. Rootkit
C. Backdoor
D. Botnet
A
A department head at a university resigned on the first day of the spring semester. It was subsequently
determined that the department head deleted numerous files and directories from the server-based home
directory while the campus was closed. Which of the following policies or procedures co have prevented this
from occurring?
A. Time-of-day restrictions
B. Permission auditing and review
C. Offboarding
D. Account expiration
C
A company is using a mobile device deployment model in which employees use their personal devices for work
at their own discretion. Some of the problems the company is encountering include the following:
*There is no standardization.
*Employees ask for reimbursement for their devices.
*Employees do not replace their devices often enough to keep them running efficiently.
*The company does not have enough control over the devices.
Which of the following is a deployment model that would help the company overcome these problems?
A. BYOD
B. VDI
C. COPE
D. CYOD
C