Security+ SYO-501 PM-A Flashcards
Match the description with the most accurate attack type. Not all attack types will be used.
Attacker obtains bank account number and birth date by calling the victim.
A. Hoax B. Spam C. Vishing D. Man-in-the-Middle E. Social Engineering F. Spoofing G. Whaling H. DDoS
C. Vishing (social engineering over the phone)
Match the description with the most accurate attack type. Not all attack types will be used.
Attacker modifies a legitimate DNS server to resolve the IP address of a malicious site.
A. Hoax B. Spam C. Vishing D. Man-in-the-Middle E. Social Engineering F. Spoofing G. Whaling H. DDoS
F. Spoofing (Any time a device pretends to be another device)
Match the description with the most accurate attack type. Not all attack types will be used.
Attacker intercepts all communication between a client and a web server.
A. Hoax B. Spam C. Vishing D. Man-in-the-Middle E. Social Engineering F. Spoofing G. Whaling H. DDoS
D. Man-in-the-Middle
Match the description with the most accurate attack type. Not all attack types will be used.
Multiple attackers overwhelm a web server
A. Hoax B. Spam C. Vishing D. Man-in-the-Middle E. Social Engineering F. Spoofing G. Whaling H. DDoS
H. DDoS (Distributed Denial of Service)
Match the description with the most accurate attack type. Not all attack types will be used.
A virus alert appears in your browser from Microsoft with a phone number to call for support.
A. Hoax B. Spam C. Vishing D. Man-in-the-Middle E. Social Engineering F. Spoofing G. Whaling H. DDoS
A. Hoax
The security team at a local public library system is creating a set of minimum security standards for the various computer systems used at the library.
Select the BEST security control for each available placeholder. All of the available security controls will be used once.
Security Controls:
A. Video Surveillance B. Biometric Reader C. Cable Lock D. Locking Cabinets E. Environmental Sensors F. Full-Disk Encryption G. Smart Card
Location: Library/Web Server and Database Server
Description: Computer Room/High Security
Select three (3) Security Controls
A. Video Surveillance
D. Locking Cabinets
E. Environmental Sensors
The security team at a local public library system is creating a set of minimum security standards for the various computer systems used at the library.
Select the BEST security control for each available placeholder. All of the available security controls will be used once.
Security Controls:
A. Video Surveillance B. Biometric Reader C. Cable Lock D. Locking Cabinets E. Environmental Sensors F. Full-Disk Encryption G. Smart Card
Location: Library/Employee Laptops
Description: Offsite use/Contains PII
B. Biometric Reader
F. Full-Disk Encryption
The security team at a local public library system is creating a set of minimum security standards for the various computer systems used at the library.
Select the BEST security control for each available placeholder. All of the available security controls will be used once.
Security Controls:
A. Video Surveillance B. Biometric Reader C. Cable Lock D. Locking Cabinets E. Environmental Sensors F. Full-Disk Encryption G. Smart Card
Location: Library/Lending Systems
Description: Manages the check-in and check-out process
G. Smart Card
The security team at a local public library system is creating a set of minimum security standards for the various computer systems used at the library.
Select the BEST security control for each available placeholder. All of the available security controls will be used once.
Security Controls:
A. Video Surveillance B. Biometric Reader C. Cable Lock D. Locking Cabinets E. Environmental Sensors F. Full-Disk Encryption G. Smart Card
Location: Digital Newspaper/Reading Lab
Description: Open Area/No supervision/Laptop Computers
C. Cable Lock
Fill in the blank with the BEST secure network protocol for the description:
Accept customer purchases from your primary website
HTTPS
Synchronize the time across all of your devices
NTPsec (Network Time Protocol Security)
Access your switch using a CLI terminal screen
SSH
Talk with customers on scheduled conference calls
SRTP (Secure Real-time Transport Protocol)
Gather metrics from routers at remote sites
SNMPv3