SYO 501 Flashcards
To pass the test
QUESTION 1
Malicious traffic from an internal network has been detected on an unauthorized port on an application server.
Which of the following network-based security controls should the engineer consider implementing?
A. ACLs
B. HIPS
C. NAT
D. MAC filtering
Correct Answer: A
A. ACLs
QUESTION 2
A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?
A. DMZ
B. NAT
C. VPN
D. PAT
Correct Answer: C
C. VPN
QUESTION 3
A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following
requirements:
All access must be correlated to a user account.
All user accounts must be assigned to a single individual.
User access to the PHI data must be recorded.
Anomalies in PHI data access must be reported.
Logs and records cannot be deleted or modified.
Which of the following should the administrator implement to meet the above requirements? (Select three.)
A. Eliminate shared accounts.
B. Create a standard naming convention for accounts.
C. Implement usage auditing and review.
D. Enable account lockout thresholds.
E. Copy logs in real time to a secured WORM drive.
F. Implement time-of-day restrictions.
G. Perform regular permission audits and reviews.
Correct Answer: ACG
A. Eliminate shared accounts.
C. Implement usage auditing and review.
G. Perform regular permission audits and reviews.
QUESTION 4 Which of the following encryption methods does PKI typically use to securely protect keys? A. Elliptic curve B. Digital signatures C. Asymmetric D. Obfuscation
Correct Answer: C
C. Asymmetric
QUESTION 5 An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability? A. False negative B. True negative C. False positive D. True positive
Correct Answer: C
C. False positive
QUESTION 6 An organization’s internal auditor discovers that large sums of money have recently been paid to a vendor that management does not recognize. The IT security department is asked to investigate the organizations the organization’s ERP system to determine how the accounts payable module has been used to make these vendor payments. The IT security department finds the following security configuration for the accounts payable module: New Vendor Entry – Required Role: Accounts Payable Clerk New Vendor Approval – Required Role: Accounts Payable Clerk Vendor Payment Entry – Required Role: Accounts Payable Clerk Vendor Payment Approval – Required Role: Accounts Payable Manager Which of the following changes to the security configuration of the accounts payable module would BEST mitigate the risk?
Correct Answer: A
A. New Vendor Entry – Required Role: Accounts Payable Clerk
New Vendor Approval – Required Role: Accounts Payable Clerk
Vendor Payment Entry – Required Role: Accounts Payable Clerk
Vendor Payment Approval – Required Role: Accounts Payable Manager
QUESTION 7 A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring? A. Time-of-day restrictions B. Permission auditing and review C. Offboarding D. Account expiration
Correct Answer: C
C. Offboarding
QUESTION 8 A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily differential backups also performed at 12:00 a.m. If the database is restored on Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery? A. 1 B. 2 C. 3 D. 4
Correct Answer: B
B. 2
QUESTION 9 Which of the following security controls does an iris scanner provide? A. Logical B. Administrative C. Corrective D. Physical E. Detective F. Deterrent
Correct Answer: D
D. Physical
QUESTION 10
As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technical must ensure the OS settings are hardened.
Which of the following is the BEST way to do this?
A. Use a vulnerability scanner.
B. Use a configuration compliance scanner.
C. Use a passive, in-line scanner.
D. Use a protocol analyzer.
Correct Answer: B
B. Use a configuration compliance scanner.
QUESTION 11 When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK? A. DES B. AES C. MD5 D. WEP
Correct Answer: B
B. AES
QUESTION 12
A company has a data classification system with definitions for “Private” and “Public”. The company’s security policy outlines how data should be protected based
on type. The company recently added the data type “Proprietary”.
Which of the following is the MOST likely reason the company added this data type?
A. Reduced cost
B. More searchable data
C. Better data classification
D. Expanded authority of the privacy officer
Correct Answer: C
C. Better data classification
QUESTION 13 When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects? A. Owner B. System C. Administrator D. User
Correct Answer: C
C. Administrator
QUESTION 14
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following
types of controls does this BEST describe?
A. Deterrent
B. Preventive
C. Detective
D. Compensating
Correct Answer: A
A. Deterrent
QUESTION 15 A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and does not have network access. Which of the following types of attacks are MOST likely occurring? (Select two.) A. Replay B. Rainbow tables C. Brute force D. Pass the hash E. Dictionary
Correct Answer: CE
C. Brute force
E. Dictionary
QUESTION 16
Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:
Slow performance
Word documents, PDFs, and images no longer opening
A pop-up
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view
it in her word processor. With which of the following is the device MOST likely infected?
A. Spyware
B. Crypto-malware
C. Rootkit
D. Backdoor
Correct Answer: D
D. Backdoor
QUESTION 17
A company is terminating an employee for misbehavior. Which of the following steps is MOST important in the process of disengagement from this employee?
A. Obtain a list of passwords used by the employee.
B. Generate a report on outstanding projects the employee handled.
C. Have the employee surrender company identification.
D. Have the employee sign an NDA before departing.
Correct Answer: B
C. Have the employee surrender company identification.
QUESTION 18 A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment? A. A perimeter firewall and IDS B. An air gapped computer network C. A honeypot residing in a DMZ D. An ad hoc network with NAT E. A bastion host
Correct Answer: B
B. An air gapped computer network
QUESTION 19
Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?
A. Roll back changes in the test environment
B. Verify the hashes of files
C. Archive and compress the files
D. Update the secure baseline
Correct Answer: B
B. Verify the hashes of files
QUESTION 20
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access.
The virus was not deleted or blocked by the company’s email filter, website filter, or antivirus. Which of the following describes what occurred?
A. The user’s account was over-privileged.
B. Improper error handling triggered a false negative in all three controls.
C. The email originated from a private email server with no malware protection.
D. The virus was a zero-day attack.
Correct Answer: D
D. The virus was a zero-day attack.
QUESTION 21 An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment of DNSSEC at the organization? A. LDAP B. TPM C. TLS D. SSL E. PKI
Correct Answer: C
C. TLS
QUESTION 22
A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems
is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?
A. Vulnerability scanning
B. Penetration testing
C. Application fuzzing
D. User permission auditing
Correct Answer: A
A. Vulnerability scanning
QUESTION 23
An administrator is replacing a wireless router. The configuration of the old wireless router was not documented before it stopped functioning. The equipment
connecting to the wireless network uses older legacy equipment that was manufactured prior to the release of the 802.11i standard. Which of the following
configuration options should the administrator select for the new wireless router?
A. WPA+CCMP
B. WPA2+CCMP
C. WPA+TKIP
D. WPA2+TKIP
Correct Answer: C
C. WPA+TKIP
QUESTION 24
An application team is performing a load-balancing test for a critical application during off-hours and has requested access to the load balancer to review which
servers are up without having the administrator on call. The security analyst is hesitant to give the application team full access due to other critical applications
running on the load balancer. Which of the following is the BEST solution for security analyst to process the request?
A. Give the application team administrator access during off-hours.
B. Disable other critical applications before granting the team access.
C. Give the application team read-only access.
D. Share the account with the application team.
Correct Answer: C
C. Give the application team read-only access.
QUESTION 25 Which of the following cryptographic attacks would salting of passwords render ineffective? A. Brute force B. Dictionary C. Rainbow tables D. Birthday
Correct Answer: C
C. Rainbow tables
QUESTION 26
A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these
requirements, which of the following technologies should the analyst recommend and configure?
A. LDAP services
B. Kerberos services
C. NTLM services
D. CHAP services
Correct Answer: B
B. Kerberos services
QUESTION 27 Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Which of the following should be used to sign the user’s certificates? A. RA B. CA C. CRL D. CSR
Correct Answer: B
B. CA
QUESTION 28 Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser? A. Buffer overflow B. MITM C. XSS D. SQLi
Correct Answer: C
C. XSS
QUESTION 29
An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps
should the responder perform NEXT?
A. Capture and document necessary information to assist in the response.
B. Request the user capture and provide a screenshot or recording of the symptoms.
C. Use a remote desktop client to collect and analyze the malware in real time.
D. Ask the user to back up files for later recovery.
Correct Answer: A
A. Capture and document necessary information to assist in the response.
QUESTION 30
A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types
of malware is MOST likely causing this issue?
A. Botnet
B. Ransomware
C. Polymorphic malware
D. Armored virus
Correct Answer: A
A. Botnet
QUESTION 31 Which of the following technologies employ the use of SAML? (Select two.) A. Single sign-on B. Federation C. LDAP D. Secure token E. RADIUS
Correct Answer: AB
A. Single sign-on
B. Federation
QUESTION 32 Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS? A. Privilege escalation B. Pivoting C. Process affinity D. Buffer overflow
Correct Answer: A
A. Privilege escalation
QUESTION 33
After a user reports stow computer performance, a systems administrator detects a suspicious file, which was installed as part of a freeware software package.
The systems administrator reviews the output below:
C:\Windows\system32>netstat -nab
Active Connections
Proto Local Address Foreign Address State
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING RpcSs| [svchost.exe]
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING [svchost.exe]
TCP 192.168.1.10:5000 10.37.213.20 ESTABLISHED winserver.exe
UDP 192.168.1.10:1900 . SSDPSVR
Based on the above information, which of the following types of malware was installed on the user’s computer?
A. RAT
B. Keylogger
C. Spyware
D. Worm
E. Bot
Correct Answer: A
A. RAT
QUESTION 34
Which of the following network vulnerability scan indicators BEST validates a successful, active scan?
A. The scan job is scheduled to run during off-peak hours.
B. The scan output lists SQL injection attack vectors.
C. The scan data identifies the use of privileged-user credentials.
D. The scan results identify the hostname and IP address.
Correct Answer: B
B. The scan output lists SQL injection attack vectors.
QUESTION 35
An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted
authentication of wireless clients over TLS?
A. PEAP
B. EAP
C. WPA2
D. RADIUS
Correct Answer: A
A. PEAP
QUESTION 36
A manager wants to distribute a report to several other managers within the company. Some of them reside in remote locations that are not connected to the
domain but have a local server. Because there is sensitive data within the report and the size of the report is beyond the limit of the email attachment size, emailing
the report is not an option. Which of the following protocols should be implemented to distribute the report securely? (Select three.)
A. S/MIME
B. SSH
C. SNMPv3
D. FTPS
E. SRTP
F. HTTPS
G. LDAPS
Correct Answer: BDF
B. SSH
D. FTPS
F. HTTPS
An auditor is reviewing the following output from a password-cracking tool:
user1: Password1
user2: Recovery!
user3: Alsakan10
user4: 4Private
user5: PerForMance2
Which of the following methods did the auditor MOST likely use? A. Hybrid B. Dictionary C. Brute force D. Rainbow table
Correct Answer: A
A. Hybrid
QUESTION 38 Which of the following must be intact for evidence to be admissible in court? A. Chain of custody B. Order of volatility C. Legal hold D. Preservation
Correct Answer: A
A. Chain of custody
QUESTION 39 A vulnerability scanner that uses its running service’s access level to better assess vulnerabilities across multiple assets within an organization is performing a: A. Credentialed scan. B. Non-intrusive scan. C. Privilege escalation test. D. Passive scan.
Correct Answer: A
A. Credentialed scan
QUESTION 40 Which of the following cryptography algorithms will produce a fixed-length, irreversible output? A. AES B. 3DES C. RSA D. MD5
Correct Answer: D
D. MD5