SYO 501 part 2 Flashcards

To pass the SYO 501 Security +

1
Q

QUESTION 101
A supervisor in your organization was demoted on Friday afternoon. The supervisor had the ability to modify the contents of a confidential database, as well as other
managerial permissions. On Monday morning, the database administrator reported that log files indicated that several records were missing from the database.
Which of the following risk mitigation strategies should have been implemented when the supervisor was demoted?
A. Incident management
B. Routine auditing
C. IT governance
D. Monthly user rights reviews

A

Correct Answer: B

B. Routine auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
QUESTION 102
Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth?
A. War chalking
B. Bluejacking
C. Bluesnarfing
D. Rogue tethering
A

Correct Answer: B

B. Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
QUESTION 103
A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the
Internet.
Which of the following should be used in the code? (Select TWO.)
A. Escrowed keys
B. SSL symmetric encryption key
C. Software code private key
D. Remote server public key
E. OCSP
A

Correct Answer: CE
C. Software code private key
E. OCSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION 104
A security guard has informed the Chief Information Security Officer that a person with a tablet has been walking around the building. The guard also noticed
strange white markings in different areas of the parking lot.
The person is attempting which of the following types of attacks?
A. Jamming
B. War chalking
C. Packet sniffing
D. Near field communication

A

Correct Answer: B

B. War Chalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QUESTION 105
A system administrator is configuring a site-to-site VPN tunnel.
Which of the following should be configured on the VPN concentrator during the IKE phase?
A. RIPEMD
B. ECDHE
C. Diffie-Hellman
D. HTTPS

A

Correct Answer: C

C. Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

QUESTION 106
A network operations manager has added a second row of server racks in the datacenter. These racks face the opposite direction of the first row of racks.
Which of the following is the reason the manager installed the racks this way?
A. To lower energy consumption by sharing power outlets
B. To create environmental hot and cold isles
C. To eliminate the potential for electromagnetic interference
D. To maximize fire suppression capabilities

A

Correct Answer: B

B. To create environmental hot and cold isles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly