Security+ Pre-Assesment Test Questions (SYO-401) Flashcards
Practice exam questions from the Study Guide and Practice Exams Guides.
You are the senior security officer within your organization and need to implement a security feature that controls which workstations can connect to a network switch. Which switch feature would you use? A. Disable unused ports B. Port mirroring C. VLANs D. Port security
D. Port security
Your manager would like to implement some form of technology that would only allow a VPN client to connect to the network if their system is up to date with patches and antivirus definitions. Which of the following would do this? A. NAT B. NAC C. VLANs D. 802.1x
B. NAC
You are researching and identifying any unsecure protocols used by applications on the network. You have learned that the network administrators are using Telnet to connect to routers and switches for remote administration. Which of the following protocols would you replace Telnet with to ensure secure communication? A. FTP B. HTTPS C. SSH D. SFTP
C. SSH
Your coworker, Matt, is looking to create a wireless network in the office to allow users to roam throughout the office with their laptops. Matt asks what steps he should take to configure some security on the wireless network. (Select three) A. Enable SSID broadcasting B. Disable SSID broadcasting C. Enable WEP D. Enable WPA2 E. Disable MAC Filtering F. Enable MAC Filtering
B. Disable SSID broadcasting D. Enable WPA2 F. Enable MAC Filtering
Your coworker, Jeff, is looking at configuring security controls to help create a more secure environment for your office. He is not sure what a management control is. Which of the following is an example of a management control? A. Security policy B. Firewall C. Antivirus software D. Backup
A. Security Policy
You are working on a risk assessment and need to calculate the ALE. Which of the following represents the formula for ALE? A. MTTF*SLE B. SLE/ARO C. MTTF/SLE D. SLE*ARO
D. SLE*ARO
You are reviewing the physical security for your office and would like to mitigate the risk of tailgating within your organization. Which of the following would you implement? A. Swipe cards B. Keypads C. Proximity readers D. Mantrap
D. Mantrap
You are the first responder for the incident response team at your company. What is your first goal when responding to a security incident? A. Perform a change audit B. Containment C. Back up the log files D. Capture an image
B. Containment
Which of the following attack types involves the hacker infecting a site you visit, which then infects your system when you visit the site? A. Phishing B. Vishing C. Watering hole D. Spoofing
C. Watering hole
You work for a software development company. Your manager has been hearing about a large number of buffer overflow attacks and is wondering how to help prevent the attacks against the software your company creates. What would you recommend? A. Input validation B. Patching C. Strong passwords D. Encryption
A. Input validation
You are looking at performing a security assessment of your organization, but your manager has expressed concerns and does not want any active attacks being performed against production systems. What type of assessment should you perform? A. Buffer overflow B. Penetrationtest C. Brute-force D. Vulnerability assessment
D. Vulnerability assessment
Your manager has tasked you with hardening the operating system of the accounting department system. Which of the following tasks will you perform? A. Add all accounts to the administrators group B. Disable unnecessary services C. Enable all interfaces D. Perform a brute-force attack
B. Disable unnecessary services
Which of the following is a method of testing applications against malicious input? A. Hashing B. Fuzzing C. Data labeling D. Zero day exploits
B. Fuzzing
The sales manager for your company wants to use his tablet for business purposes. Which of the following would you do to secure the data on the device? (Select two) A. Device encryption B. HTTPS C. WPA2 D. Disable SSID broadcasting E. Screen lock
A. Device encryption E. Screen lock
Your company is considering allowing employees to use their own devices in the office to perform their job. Which of the following would represent a valid concern of BYOD? A. Proper lighting B. ALE C. Data ownership D. TKIP
C. Data ownership