SY0-401 Flashcards
A user has plugged in a wireless router from home with default configurations into a network jack at the office. This is known as:
A rogue access point
An administrator has to determine host operating systems on the network and has deployed a transparent proxy. Which of the following fingerprint types would this solution use?
Passive
A user has called the help desk to report an enterprise mobile device was stolen. The technician receiving the call accesses the MDM administration portal to identify the device’s last known geographic location. The technician determines the device is still communication with the MDM. After taking note of the last known location, the administrator continues to follow the rest of the checklist. Which of the following identifies a possible NEXT step for the administrator?
Issue a remote wipe command
Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive client files has risen far above normal. Which of the following kind of IDS is in use?
Anomaly based
When implementing a mobile security strategy for an organization, which of the following is the MOST influential concern that contributes to that organization’s ability to extend enterprise policies to mobile devices?
Support for mobile OS
An employee connects a wireless access point to the only jack in the conference room to provide internet access during a meeting. The access point is configured to use WPA-TKIP. A malicious user is able to intercept clear text HTTP communication between the meeting attendees and the internet. Which of the following is the reason the malicious user is able to intercept and see the clear text communication?
The malicious user is able to capture the wired communication
Which of the following controls should critical application servers implement to protect themselves from other potentially compromised application services?
Host-based firewalls
A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication and the files the user is sending using only a user ID and a key pair. Which of the following methods would achieve this goal?
IPSec
A security administrator would like the corporate web server to select perfect forward secrecy ciphers first. Which of the following cipher suites should the administrator select to accomplish this goal?
ECDHE-RSA-AES128-SHA
A corporate wireless guest network uses an open SSID with a captive portal to authenticate guest users. Guests can obtain their portal password at the service desk. A security consultant alerts the administrator that the captive portal is easily bypassed, as long as one other wireless guest user is on the network. Which of the following attacks did the security consultant use?
MAC Spoofing
A company’s application is hosted at a data center. The data center provides security controls for the infrastructure. The data center provides a report identifying several vulnerabilities regarding out of date OS patches. The company recommends the data center assumes the risk associated with the OS vulnerabilities. Which of the following concepts is being implemented?
Risk Transference
An organization processes credit card transactions and is concerned that an employee may intentionally email credit card numbers to external email addresses. This company should consider which of the following technologies?
DLP
Which of the following can be used to control specific commands that can be executed on network infrastructure device?
TACACS+
Visible security cameras are considered to be which of the following types of security controls?
Deterrent
Which of the following devices is used for the transparent security inspection of network traffic by redirecting user packets prior to sending the packets to the intended destination?
Proxies