Comptia (SY0-601) Exam Questions And Answers page 27
A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following message:
Which of the following network attacks is the researcher MOST likely experiencing?
Which of the following network attacks is the researcher MOST likely experiencing?
Evil twin
Man-in-the-middle
ARP poisoning
Threats, Attacks, and Vulnerabilities
Technologies and Tools
A new plug-and-play storage device was installed on a PC in the corporate environment. Which of the following safeguards will BEST help to protect the PC from malicious files on the storage device?
Change the default settings on the PC
Define the PC firewall rules to limit access
Encrypt the disk on the storage device
Plug the storage device in to the UPS
Threats, Attacks, and Vulnerabilities
Technologies and Tools
Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?
To provide data to quantify risk based on the organization s systems
To keep all software and hardware fully patched for known vulnerabilities
To only allow approved, organization-owned devices onto the business network
To standardize by selecting one laptop model for all users in the organization
Architecture and Design
Risk Management
SIMULATION
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802.1X using the most secure encryption and protocol available.
INSTRUCTIONS
Perform the following steps:
1. Configure the RADIUS server.
2. Configure the WiFi controller.
3. Preconfigure the client for an incoming guest. The guest AD credentials are:
User: guest01
Password: guestpass
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802.1X using the most secure encryption and protocol available.
INSTRUCTIONS
Perform the following steps:
1. Configure the RADIUS server.
2. Configure the WiFi controller.
3. Preconfigure the client for an incoming guest. The guest AD credentials are:
User: guest01
Password: guestpass
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Technologies and Tools
Identity and Access Management
Which of the following is a team of people dedicated to testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?
Red team
White team
Blue team
Purple team
Threats, Attacks, and Vulnerabilities
Technologies and Tools
A company is concerned about its security after a red-team exercise. The report shows the team was able to reach the critical servers due to the SMB being exposed to the Internet and running NTLMv1. Which of the following BEST explains the findings?
Default settings on the servers
Unsecured administrator accounts
Open ports and services
Weak data encryption
Threats, Attacks, and Vulnerabilities
Identity and Access Management
A company is designing the layout of a new datacenter so it will have an optimal environmental temperature. Which of the following must be included? (Choose two.)
An air gap
A cold aisle
Removable doors
A hot aisle
An IoT thermostat
A humidity monitor
Architecture and Design
Identity and Access Management
A user must introduce a password and a USB key to authenticate against a secure computer, and authentication is limited to the state in which the company resides. Which of the following authentication concepts are in use?
Something you know, something you have, and somewhere you are
Something you know, something you can do, and somewhere you are
Something you are, something you know, and something you can exhibit
Something you have, somewhere you are, and someone you know
Threats, Attacks, and Vulnerabilities
Identity and Access Management
A company is setting up a web server on the Internet that will utilize both encrypted and unencrypted web-browsing protocols. A security engineer runs a port scan against the server from the Internet and sees the following output:
Which of the following steps would be best for the security engineer to take NEXT?
Which of the following steps would be best for the security engineer to take NEXT?
Allow DNS access from the Internet.
Block SMTP access from the Internet.
Block HTTPS access from the Internet.
Block SSH access from the Internet.
Threats, Attacks, and Vulnerabilities
Technologies and Tools
An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?
Order of volatility
Data recovery
Chain of custody
Non-repudiation
Threats, Attacks, and Vulnerabilities
Identity and Access Management
Comments