SYO-301 Flashcards
Which of the following is an example of a false negative?
- A. The IDS does not identify a buffer overflow
- B. Anti-virus identifies a benign application as malware.
- C. Anti-virus protection interferes with the normal operation of an application.
- D. A user account is locked out after the user mistypes the password too many times.
A. The IDS does not identify a buffer overflow
Sara and Jane, users, are reporting an increase in the amount of unwanted email that they are
receiving each day. Which of the following would be the BEST way to respond to this issue without
creating a lot of administrative overhead?
- A. Deploy an anti-spam device to protect the network.
- B. Update the anti-virus definitions and make sure that it is set to scan all received email
- C. Set up spam filtering rules in each user’s mail client.
- D. Change the firewall settings to block SMTP relays so that the spam cannot get in.
A. Deploy an anti-spam device to protect the network.
Which of the following encrypts the body of a packet, rather than just the password, while sending
information?
- A. LDAP
- B. TACACS+
- C. ACLs
- D. RADIUS
B. TACACS+
Which of the following is similar to a smurf attack, but uses UDP instead to ICMP?
- A. X-Mas attack
- B. Fraggle attack
- C. Vishing
- D. Man-in-the-middle attack
B. Fraggle attack
Pete, a security administrator, wants to secure remote telnet services and decides to use the
services over SSH. Which of the following ports should Pete allow on the firewall by default?
- A. 21
- B. 22
- C. 23
- D. 25
Which of the following accurately describes the STRONGEST multifactor authentication?
- A. Something you are, something you have
- B. Something you have, something you know
- C. Something you are near to, something you have
- D. Something you have, someone you know
A. Something you are, something you have
Which of the following is a valid server-role in a Kerberos authentication system?
- A. Token issuing system
- B. Security assertion server
- C. Authentication agent
- D. Ticket granting server
D. Ticket granting server
A company is performing internal security audits after a recent exploitation on one of their
proprietary applications. Sara, the security auditor, is given the workstation with limited
documentation regarding the application installed for the audit. Which of the following types of
testing methods is this?
- A. Sandbox
- B. White box
- C. Black box
- D. Gray box
D. Gray box
Sara, a security analyst, discovers which operating systems the client devices on the network are
running by only monitoring a mirror port on the router. Which of the following techniques did Sara
use?
- A. Active fingerprinting
- B. Passive finger printing
- C. Protocol analyzing
- D. Network enumerating
B. Passive Fingerprinting
Which of the following is the BEST solution to securely administer remote servers?
- A. SCP
- B. SSH
- C. Telnet
- D. SFTP
B. SSH
A company has sent all of its private keys to a third party. The third party company has created a
secure list of these keys. Which of the following has just been implemented?
- A. Key escrow
- B. CRL
- C. CA
- D. Recovery agent
A. Key escrow
Which of the following authentication protocols forces centralized wireless authentication?
- A. WPA2-Personal
- B. WPA2-Enterprise
- C. WPA2-CCMP
- D. WPA2-TKIP
B. WPA2-Enterprise
The fundamental information security principals include confidentiality, availability and which of the
following?
- A. The ability to secure data against unauthorized disclosure to external sources
- B. The capacity of a system to resist unauthorized changes to stored information
- C. The confidence with which a system can attest to the identity of a user
- D. The characteristic of a system to provide uninterrupted service to authorized users
B. The capacity of a system to resist unauthorized changes to stored information
Which of the following risks could IT management be mitigating by removing an all-in-one device?
- A. Continuity of operations
- B. Input validation
- C. Single point of failure
- D. Single sign on
Social networking sites are used daily by the marketing team for promotional purposes. However,
confidential company information, including product pictures and potential partnerships, have been
inadvertently exposed to the public by dozens of employees using social networking sites. Which
of following is the BEST response to mitigate this threat with minimal company disruption?
- A. Mandate additional security awareness training for all employees.
- B. Report each employee to Human Resources for termination for violation of security policies
- C. Implement a data loss prevention program to filter email.
- D. Block access to social networking sites from the corporate network
- CompTIA SY0-301 Exam
A. Mandate additional security awareness training for all employees.