Comptia (SY0-601) Exam Questions And Answers page 17
A security assessment determines DES and 3DES are still being used on recently deployed production servers. Which of the following did the assessment identify?
Default settings
Open permissions
Weak encryption
Threats, Attacks, and Vulnerabilities
Technologies and Tools
A security administrator is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of the legitimate access points. Which of the following attacks is happening on the corporate network?
Man in the middle
Evil twin
Jamming
Rogue access point
Disassociation
Threats, Attacks, and Vulnerabilities
Architecture and Design
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company s data?
Containerization
Geofencing
Full-disk encryption
Remote wipe
Technologies and Tools
Risk Management
A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?
Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration privileges on fileshares.
Purchase cyber insurance from a reputable provider to reduce expenses during an incident.
Invest in end-user awareness training to change the long-term culture and behavior of staff and executives, reducing the organization's susceptibility to phishing attacks.
Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups.
Threats, Attacks, and Vulnerabilities
Risk Management
A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company s network. The company s lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts. While reviewing the log files, the analyst discovers the following:
Which of the following attacks MOST likely occurred?
Which of the following attacks MOST likely occurred?
Dictionary
Credential-stuffing
Password-spraying
Brute-force
Threats, Attacks, and Vulnerabilities
Identity and Access Management
An organization has decided to host its web application and database in the cloud. Which of the following BEST describes the security concerns for this decision?
Access to the organization s servers could be exposed to other cloud-provider clients.
The cloud vendor is a new attack vector within the supply chain.
Outsourcing the code development adds risk to the cloud provider.
Vendor support will cease when the hosting platforms reach EOL.
Threats, Attacks, and Vulnerabilities
Architecture and Design
A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?
MSSP
SOAR
IaaS
PaaS
Technologies and Tools
Risk Management
A web server administrator has redundant servers and needs to ensure failover to the secondary server when the primary server goes down. Which of the following should the administrator implement to avoid disruption?
NIC teaming
High availability
Dual power supply
IaaS
Technologies and Tools
Architecture and Design
Users at an organization have been installing programs from the Internet on their workstations without first receiving proper authorization. The organization maintains a portal from which users can install standardized programs. However, some users have administrative access on their workstations to enable legacy programs to function properly. Which of the following should the security administrator consider implementing to address this issue?
Application code signing
Application whitelisting
Data loss prevention
Web application firewalls
Threats, Attacks, and Vulnerabilities
Identity and Access Management
The website http://companywebsite.com requires users to provide personal information, including security question responses, for registration. Which of the following would MOST likely cause a data breach?
Lack of input validation
Open permissions
Unsecure protocol
Missing patches
Threats, Attacks, and Vulnerabilities
Comments