SY0-201 Security Plus Practice Exam

Study material for Security + 

11 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:
A. SSL.
B. SSH.
C. L2TP.
D. IPSeC.
C. L2TP
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to
secretly embed data?
A. Steganography
B. Worm
C. Trojan horse
D. Virus
A. Steganography
QUESTION NO: 3
Which of the following type of attacks would allow an attacker to capture HTTP requests and send
back a spoofed page?
A. Teardrop
B. TCP/IP hijacking
C. Phishing
D. Replay
B. TCP/IP hijacking
How should a company test the integrity of its backup data?
A. By conducting another backup
B. By using software to recover deleted files
C. By restoring part of the backup
D. By reviewing the written procedures
C. By restoring part of the backup
Which of following can BEST be used to determine the topology of a network and discover
unknown devices?
A. Vulnerability scanner
B. NIPS
C. Protocol analyzer
D. Network mapper
D. Netowork Mapper
When should a technician perform penetration testing?
A. When the technician suspects that weak passwords exist on the network
B. When the technician is trying to guess passwords on a network
C. When the technician has permission from the owner of the network
D. When the technician is war driving and trying to gain access
C. When the technician has permission from the owner of the network
An administrator has implemented a new SMTP service on a server. A public IP address
translates to the internal SMTP server. The administrator notices many sessions to the server, and
gets notification that the servers public IP address is now reported in a spam real-time block
list.Which of the following is wrong with the server?
A. SMTP open relaying is enableD.
B. It does not have a spam filter.
C. The amount of sessions needs to be limiteD.
D. The public IP address is incorrect.
A. SMTP open relaying is enableD
Which of the following is MOST efficient for encrypting large amounts of data?
A. Hashing algorithms
B. Symmetric key algorithms
C. Asymmetric key algorithms
D. ECC algorithms
B. Symmetric key algorithms
Which of the following is a reason why a company should disable the SSID broadcast of the
wireless
access points?
A. Rogue access points
B. War driving
C. Weak encryption
D. Session hijacking
B. War driving
Which of the following BEST describes ARP?
A. Discovering the IP address of a device from the MAC address
B. Discovering the IP address of a device from the DNS name
C. Discovering the MAC address of a device from the IP address
D. Discovering the DNS name of a device from the IP address
C. Discovering the MAC address of a device from the IP address
Which of the following would be BEST to use to apply corporate security settings to a device?
A. A security patch
B. A security hotfix
C. An OS service pack
D. A security template
D. A security template