SY0-401 Flashcards

1
Q

A user has plugged in a wireless router from home with default configurations into a network jack at the office. This is known as:

A

A rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator has to determine host operating systems on the network and has deployed a transparent proxy. Which of the following fingerprint types would this solution use?

A

Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user has called the help desk to report an enterprise mobile device was stolen. The technician receiving the call accesses the MDM administration portal to identify the device’s last known geographic location. The technician determines the device is still communication with the MDM. After taking note of the last known location, the administrator continues to follow the rest of the checklist. Which of the following identifies a possible NEXT step for the administrator?

A

Issue a remote wipe command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive client files has risen far above normal. Which of the following kind of IDS is in use?

A

Anomaly based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When implementing a mobile security strategy for an organization, which of the following is the MOST influential concern that contributes to that organization’s ability to extend enterprise policies to mobile devices?

A

Support for mobile OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An employee connects a wireless access point to the only jack in the conference room to provide internet access during a meeting. The access point is configured to use WPA-TKIP. A malicious user is able to intercept clear text HTTP communication between the meeting attendees and the internet. Which of the following is the reason the malicious user is able to intercept and see the clear text communication?

A

The malicious user is able to capture the wired communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following controls should critical application servers implement to protect themselves from other potentially compromised application services?

A

Host-based firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication and the files the user is sending using only a user ID and a key pair. Which of the following methods would achieve this goal?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security administrator would like the corporate web server to select perfect forward secrecy ciphers first. Which of the following cipher suites should the administrator select to accomplish this goal?

A

ECDHE-RSA-AES128-SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A corporate wireless guest network uses an open SSID with a captive portal to authenticate guest users. Guests can obtain their portal password at the service desk. A security consultant alerts the administrator that the captive portal is easily bypassed, as long as one other wireless guest user is on the network. Which of the following attacks did the security consultant use?

A

MAC Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company’s application is hosted at a data center. The data center provides security controls for the infrastructure. The data center provides a report identifying several vulnerabilities regarding out of date OS patches. The company recommends the data center assumes the risk associated with the OS vulnerabilities. Which of the following concepts is being implemented?

A

Risk Transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization processes credit card transactions and is concerned that an employee may intentionally email credit card numbers to external email addresses. This company should consider which of the following technologies?

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following can be used to control specific commands that can be executed on network infrastructure device?

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Visible security cameras are considered to be which of the following types of security controls?

A

Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following devices is used for the transparent security inspection of network traffic by redirecting user packets prior to sending the packets to the intended destination?

A

Proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network security analyst has confirmed that the public facing web server has been compromised. Which of the following stages of the Incident Handling Response does this describe?

A

Identification

17
Q

Which of the following will help prevent smurf attacks?

A. Allowing necessary UDP packets in and out of the network
B. Disabling directed broadcast on border routers
C. Disabling unused services on the gateway firewall
D. Flash the BIOS with the latest firmware

A

B. Disabling directed broadcast on border routers

18
Q

A security administrator needs to implement a technology that creates a secure key exchange. Neither party involved in the key exchange will have pre-existing knowledge of one another. Which of the following technologies would allow for this?

A. Blowfish
B. NTLM
C. Diffie-Heilman
D. CHAP

A

C. Diffie-Heilman

19
Q

Which of the following password attacks is MOST likely to crack the largest number of randomly generated passwords?

A. Hybrid
B. Birthday attack
C. Dictionary
D. Rainbow Tables

A

A. Hybrid