1. Trang chủ
  2. » Công Nghệ Thông Tin

Dump_Security + SY0 501_Latest

338 111 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

Dump Security plus SY0 501 latest. Dump mới cập nhật mới nhất. Đảm bảo đậu cao. Dump Security plus SY0 501 latest. Dump mới cập nhật mới nhất. Đảm bảo đậu cao. Dump Security plus SY0 501 latest. Dump mới cập nhật mới nhất. Đảm bảo đậu cao. Dump Security plus SY0 501 latest. Dump mới cập nhật mới nhất. Đảm bảo đậu cao.

SY0-501.examsforall.premium.exam.540q Number: SY0-501 Passing Score: 800 Time Limit: 120 File Version: 10.0 SY0-501 CompTIA Security+ Certification Exam Version 10.0 Sections (none) Exam A QUESTION DRAG DROP A security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center Drag and drop the applicable controls to each asset types Instructions: Controls can be used multiple times and not all placeholders need to be filled When you have completed the simulation, please select the Done button to submit Select and Place: A B C D Correct Answer: Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION HOTSPOT Select the appropriate attack from each drop down list to label the corresponding illustrated attack Instructions: Attacks may only be used once, and will disappear from drop down list if selected When you have completed the simulation, please select the Done button to submit Hot Area: A B C D Correct Answer: Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: Explanation: 1: Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data As with the e-mail messages used in regular phishing expeditions, spear phishing messages appear to come from a trusted source Phishing messages usually appear to come from a large and well-known company or Web site with a broad membership base, such as eBay or PayPal In the case of spear phishing, however, the apparent source of the e-mail is likely to be an individual within the recipient's own company and generally someone in a position of authority 2: The Hoax in this question is designed to make people believe that the fake AV (anti- virus) software is genuine 3: Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit 4: Phishing is the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft Phishing email will direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has The website, however, is bogus and set up only to steal the information the user enters on the page 5: Similar in nature to e-mail phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming 'poisons' a DNS server by infusing false information into the DNS server, resulting in a user's request being redirected elsewhere Your browser, however will show you are at the correct Web site, which makes pharming a bit more serious and more difficult to detect Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to target large groups of people at one time through domain spoofing References: http://searchsecurity.techtarget.com/definition/spear-phishing http://www.webopedia.com/ TERM/V/vishing.html http://www.webopedia.com/TERM/P/ phishing.html http://www.webopedia.com/ TERM/P/pharming.html QUESTION DRAG DROP You have been tasked with designing a security plan for your company Drag and drop the appropriate security controls on the floor plan Instructions: All objects must be used and all place holders must be filled Order does not matter When you have completed the simulation, please select the Done button to submit Select and Place: A B C D Correct Answer: Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: Explanation: Cable locks - Adding a cable lock between a laptop and a desk prevents someone from picking it up and walking away Proximity badge + reader Safe is a hardware/physical security measure Mantrap can be used to control access to sensitive areas CCTV can be used as video surveillance Biometric reader can be used to control and prevent unauthorized access Locking cabinets can be used to protect backup media, documentation and other physical artefacts QUESTION Which of the following would a security specialist be able to determine upon examination of a server's certificate? A B C D CA public key Server private key CSR OID Correct Answer: D Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION A security analyst is diagnosing an incident in which a system was compromised from an external IP address The socket identified on the firewall was traced to 207.46.130.0:6666 Which of the following should the security analyst to determine if the compromised system still has an active connection? A B C D tracert netstat ping nslookup Correct Answer: B Section: (none) Explanation Explanation/Reference: Section: (none) Explanation/Reference: QUESTION 513 Joe, a user, has been trying to send Ann, a different user, an encrypted document via email Ann has not received the attachment but is able to receive the header information Which of the following is MOST likely preventing Ann from receiving the encrypted file? A B C D Unencrypted credentials Authentication issues Weak cipher suite Permission issues Correct Answer: B Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 514 A systems administrator is configuring a system that uses data classification labels Which of the following will the administrator need to implement to enforce access control? A B C D Discretionary access control Mandatory access control Role-based access control Rule-based access control Correct Answer: B Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 515 An analyst is using a vulnerability scanner to look for common security misconfigurations on devices Which of the following might be identified by the scanner? (Select TWO) A B C D E The firewall is disabled on workstations SSH is enabled on servers Browser homepages have not been customized Default administrator credentials exist on networking hardware The OS is only set to check for updates once a day Correct Answer: AB Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 516 A security analyst is reviewing patches on servers One of the servers is reporting the following error message in the WSUS management console: The computer has not reported status in 30 days Given this scenario, which of the following statements BEST represents the issue with the output above? A B C D The computer in question has not pulled the latest ACL policies for the firewall The computer in question has not pulled the latest GPO policies from the management server The computer in question has not pulled the latest antivirus definitions from the antivirus program The computer in question has not pulled the latest application software updates Correct Answer: D Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 517 A security administrator is reviewing the following PowerShell script referenced in the Task Scheduler on a database server: Which of the following did the security administrator discover? A B C D Ransomeware Backdoor Logic bomb Trojan Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 518 A bank is experiencing a DoS attack against an application designed to handle 500 IP-based sessions in addition, the perimeter router can only handle 1Gbps of traffic Which of the following should be implemented to prevent a DoS attacks in the future? A Deploy multiple web servers and implement a load balancer B Increase the capacity of the perimeter router to 10 Gbps C Install a firewall at the network to prevent all attacks D Use redundancy across all network devices and services Correct Answer: D Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 519 A malicious system continuously sends an extremely large number of SYN packets to a server Which of the following BEST describes the resulting effect? A B C D The server will be unable to server clients due to lack of bandwidth The server's firewall will be unable to effectively filter traffic due to the amount of data transmitted The server will crash when trying to reassemble all the fragmented packets The server will exhaust its memory maintaining half-open connections Correct Answer: D Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 520 A systems administrator is deploying a new mission essential server into a virtual environment Which of the following is BEST mitigated by the environment's rapid elasticity characteristic? A Data confidentiality breaches B VM escape attacks C Lack of redundancy D Denial of service Correct Answer: D Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 521 Which of the following is the proper order for logging a user into a system from the first step to the last step? A B C D E Identification, authentication, authorization Identification, authorization, authentication Authentication, identification, authorization Authentication, identification, authorization Authorization, identification, authentication Correct Answer: A Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 522 A company stores highly sensitive data files used by the accounting system on a server file share The accounting system uses a service account named accounting-svc to access the file share The data is protected will a full disk encryption, and the permissions are set as follows: File system permissions: Users = Read Only Share permission: accounting-svc = Read Only Given the listed protections are in place and unchanged, to which of the following risks is the data still subject? A B C D Exploitation of local console access and removal of data Theft of physical hard drives and a breach of confidentiality Remote exfiltration of data using domain credentials Disclosure of sensitive data to third parties due to excessive share permissions Correct Answer: A Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 523 A bank uses a wireless network to transmit credit card purchases to a billing system Which of the following would be MOST appropriate to protect credit card information from being accessed by unauthorized individuals outside of the premises? A B C D Air gap Infrared detection Faraday cage Protected distributions Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 524 A help desk technician receives a phone call from an individual claiming to be an employee of the organization and requesting assistance to access a locked account The help desk technician asks the individual to provide proof of identity before access can be granted Which of the following types of attack is the caller performing? A B C D Phishing Shoulder surfing Impersonation Dumpster diving Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 525 Confidential emails from an organization were posted to a website without the organization's knowledge Upon investigation, it was determined that the emails were obtained from an internal actor who sniffed the emails in plain text Which of the following protocols, if properly implemented, would have MOST likely prevented the emails from being sniffed? (Select TWO) A B C D E Secure IMAP DNSSEC S/MIME SMTPS HTTPS Correct Answer: CD Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 526 A company wants to implement an access management solution that allows employees to use the same usernames and passwords for multiple applications without having to keep multiple credentials synchronized Which of the following solutions would BEST meet these requirements? A B C D E Multifactor authentication SSO Biometrics PKI Federation Correct Answer: B Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 527 An external auditor visits the human resources department and performs a physical security assessment The auditor observed documents on printers that are unclaimed A closer look at these documents reveals employee names, addresses, ages, and types of medical and dental coverage options each employee has selected Which of the following is the MOST appropriate actions to take? A B C D Flip the documents face down so no one knows these documents are PII sensitive Shred the documents and let the owner print the new set Retrieve the documents, label them with a PII cover sheet, and return them to the printer Report to the human resources manager that their personnel are violating a privacy policy Correct Answer: D Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 528 Which of the following authentication concepts is a gait analysis MOST closely associated? A B C D Somewhere you are Something you are Something you Something you know Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 529 Which of the following metrics are used to calculate the SLE? (Select TWO) A B C D E F ROI ARO ALE MTBF MTTF TCO Correct Answer: BC Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 530 Due to regulatory requirements, server in a global organization must use time synchronization Which of the following represents the MOST secure method of time synchronization? A B C D The server should connect to external Stratum NTP servers for synchronization The server should connect to internal Stratum NTP servers for synchronization The server should connect to external Stratum NTP servers for synchronization The server should connect to external Stratum NTP servers for synchronization Correct Answer: B Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 531 When sending messages using symmetric encryption, which of the following must happen FIRST? A B C D Exchange encryption key Establish digital signatures Agree on an encryption method Install digital certificates Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 532 Which of the following scenarios BEST describes an implementation of non-repudiation? A B C D A user logs into a domain workstation and access network file shares for another department A user remotely logs into the mail server with another user's credentials A user sends a digitally signed email to the entire finance department about an upcoming meeting A user access the workstation registry to make unauthorized changes to enable functionality within an application Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 533 An office manager found a folder that included documents with various types of data relating to corporate clients The office manager notified the data included dates of birth, addresses, and phone numbers for the clients The office manager then reported this finding to the security compliance officer Which of the following portions of the policy would the security officer need to consult to determine if a breach has occurred? A B C D Public Private PHI PII Correct Answer: D Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 534 Which of the following is an asymmetric function that generates a new and separate key every time it runs? A RSA B C D E DSA DHE HMAC PBKDF2 Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 535 Which of the following would be considered multifactor authentication? A B C D Hardware token and smart card Voice recognition and retina scan Strong password and fingerprint PIN and security questions Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 536 A user receives an email from ISP indicating malicious traffic coming from the user's home network is detected The traffic appears to be Linux-based, and it is targeting a website that was recently featured on the news as being taken offline by an Internet attack The only Linux device on the network is a home surveillance camera system Which of the following BEST describes what is happening? A B C D The camera system The camera system The camera system The camera system is infected with a bot is infected with a RAT is infected with a Trojan is infected with a backdoor Correct Answer: A Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 537 A security auditor is testing perimeter security in a building that is protected by badge readers Which of the following types of attacks would MOST likely gain access? A B C D E Phishing Man-in-the-middle Tailgating Watering hole Shoulder surfing Correct Answer: C Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 538 An organization wants to upgrade its enterprise-wide desktop computer solution The organization currently has 500 PCs active on the network the Chief Information Security Officer (CISO) suggests that the organization employ desktop imaging technology for such a large scale upgrade Which of the following is a security benefit of implementing an imaging solution? A B C D it allows for faster deployment it provides a consistent baseline It reduces the number of vulnerabilities It decreases the boot time Correct Answer: B Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: QUESTION 539 An organization has implemented an IPSec VPN access for remote users Which of the following IPSec modes would be the MOST secure for this organization to implement? A B C D Tunnel mode Transport mode AH-only mode ESP-only mode Correct Answer: A Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference: Explanation: In both ESP and AH cases with IPSec Transport mode, the IP header is exposed The IP header is not exposed in IPSec Tunnel mode QUESTION 540 Several workstations on a network are found to be on OS versions that are vulnerable to a specific attack Which of the following is considered to be a corrective action to combat this vulnerability? A B C D E Install an antivirus definition patch Educate the workstation users Leverage server isolation Install a vendor-supplied patch Install an intrusion detection system Correct Answer: D Section: (none) Explanation Explanation/Reference: Section: (none) Explanation Explanation/Reference:

Ngày đăng: 07/09/2019, 19:29

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN