SY0-501 : CompTIA Security+ Certification​​ : Part 15

  1. Which of the following is a document that contains detailed information about actions that include how something will be done, when the actions will be performed, and penalties for failure?

    • MOU
    • ISA
    • BPA
    • SLA
  2. Which of the following are MOST susceptible to birthday attacks?

    • Hashed passwords 
    • Digital certificates
    • Encryption passwords
    • One time passwords
  3. Joe a computer forensic technician responds to an active compromise of a database server. Joe first collects information in memory, then collects network traffic and finally conducts an image of the hard drive.

    Which of the following procedures did Joe follow?

    • Order of volatility
    • Chain of custody
    • Recovery procedure
    • Incident isolation
  4. A system administrator wants to implement an internal communication system that will allow employees to send encrypted messages to each other. The system must also support non- repudiation. Which of the following implements all these requirements?

    • Bcrypt
    • Blowfish
    • PGP 
    • SHA
  5. Given the log output:

    Max 15 00:15:23.431 CRT: #SEC_LOGIN-5-LOGIN_SUCCESS: 
    
    Login Success [user: msmith] [Source: 10.0.12.45] 
    
    [localport: 23] at 00:15:23:431 CET Sun Mar 15 2015

    Which of the following should the network administrator do to protect data security?

    • Configure port security for logons
    • Disable telnet and enable SSH 
    • Configure an AAA server
    • Disable password and enable RSA authentication
  6. The firewall administrator is adding a new certificate for the company’s remote access solution. The solution requires that the uploaded file contain the entire certificate chain for the certificate to load properly. The administrator loads the company certificate and the root CA certificate into the file. The file upload is rejected.

    Which of the following is required to complete the certificate chain?

    • Certificate revocation list
    • Intermediate authority 
    • Recovery agent
    • Root of trust
  7. The Chief Executive Officer (CEO) of a major defense contracting company a traveling overseas for a conference. The CEO will be taking a laptop.

    Which of the following should the security administrator implement to ensure confidentiality of the data if the laptop were to be stolen or lost during the trip?

    • Remote wipe
    • Full device encryption
    • BIOS password
    • GPS tracking
  8. In an effort to reduce data storage requirements, some company devices to hash every file and eliminate duplicates. The data processing routines are time sensitive so the hashing algorithm is fast and supported on a wide range of systems.

    Which of the following algorithms is BEST suited for this purpose?

    • MD5
    • SHA 
    • RIPEMD
    • AES
  9. A new security policy in an organization requires that all file transfers within the organization be completed using applications that provide secure transfer. Currently, the organization uses FTP and HTTP to transfer files.

    Which of the following should the organization implement in order to be compliant with the new policy?

    • Replace FTP with SFTP and replace HTTP with TLS 
    • Replace FTP with FTPS and replaces HTTP with TFTP
    • Replace FTP with SFTP and replace HTTP with Telnet
    • Replace FTP with FTPS and replaces HTTP with IPSec
  10. A product manager is concerned about continuing operations at a facility located in a region undergoing significant political unrest. After consulting with senior management, a decision is made to suspend operations at the facility until the situation stabilizes.

    Which of the following risk management strategies BEST describes management’s response?

    • Deterrence
    • Mitigation
    • Avoidance 
    • Acceptance
  11. Joe notices there are several user accounts on the local network generating spam with embedded malicious code.

    Which of the following technical control should Joe put in place to BEST reduce these incidents?

    • Account lockout 
    • Group Based Privileges
    • Least privilege
    • Password complexity
  12. Two users need to securely share encrypted files via email. Company policy prohibits users from sharing credentials or exchanging encryption keys.

    Which of the following can be implemented to enable users to share encrypted data while abiding by company policies?

    • Key escrow
    • Digital signatures
    • PKI 
    • Hashing
  13. An information system owner has supplied a new requirement to the development team that calls for increased non-repudiation within the application. After undergoing several audits, the owner determined that current levels of non-repudiation were insufficient.

    Which of the following capabilities would be MOST appropriate to consider implementing is response to the new requirement?

    • Transitive trust
    • Symmetric encryption
    • Two-factor authentication
    • Digital signatures 
    • One-time passwords
  14. Joe a website administrator believes he owns the intellectual property for a company invention and has been replacing image files on the company’s public facing website in the DMZ. Joe is using steganography to hide stolen data.

    Which of the following controls can be implemented to mitigate this type of inside threat?

    • Digital signatures
    • File integrity monitoring
    • Access controls
    • Change management
    • Stateful inspection firewall
  15. The process of applying a salt and cryptographic hash to a password then repeating the process many times is known as which of the following?

    • Collision resistance
    • Rainbow table
    • Key stretching 
    • Brute force attack
  16. Which of the following is commonly used for federated identity management across multiple organizations?

    • SAML 
    • Active Directory
    • Kerberos
    • LDAP
  17. While performing surveillance activities, an attacker determines that an organization is using 802.1X to secure LAN access.

    Which of the following attack mechanisms can the attacker utilize to bypass the identified network security?

    • MAC spoofing 
    • Pharming
    • Xmas attack
    • ARP poisoning
  18. A security administrator has been asked to implement a VPN that will support remote access over IPSEC.

    Which of the following is an encryption algorithm that would meet this requirement?

    • MD5
    • AES 
    • UDP
    • PKI
  19. A security administrator is evaluating three different services: radius, diameter, and Kerberos.

    Which of the following is a feature that is UNIQUE to Kerberos?

    • It provides authentication services
    • It uses tickets to identify authenticated users 
    • It provides single sign-on capability
    • It uses XML for cross-platform interoperability
  20. Which of the following can affect electrostatic discharge in a network operations center?

    • Fire suppression
    • Environmental monitoring
    • Proximity card access
    • Humidity controls 
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments