CompTIA Security+ SY0-501 Questions & Answers Set 3

A financial organization is concerned with attackers tailgating into their new headquarters. They are investigating options to stop intruders from following employees into the building; they want to ensure that each individual has authorization. What is a physical security option they can use to secure the entrance of the building?



Options are :

  • SSID
  • Virtual authentication
  • Mantraps (Correct)
  • WEP

Answer : Mantraps

It is important to be familiar with and aware of tools used by security professionals in the industry and how they are used to improve an organization's security posture. Knowing of a widely used software or interface can improve performance or turnaround time. What is one common vulnerability scanner used by security experts?


Options are :

  • LANsurveyor
  • Visio
  • Nessus (Correct)
  • Nmap

Answer : Nessus

In order to redirect users at Acme Inc., an attacker sets up a DNS poisoning attack based on the main portal that the employees use. The attacker configures the DNS redirection to point to a website that questions the users for credentials, stating that their passwords are incorrect. After a user enters their password, the attacker gets a notification, then uses this information to create a VPN connection that has access to the company network. Which of the following could render this attack ineffective?


Options are :

  • Intrusion detection system
  • Intrusion prevention system
  • DNSSEC (Correct)
  • Backup DNS servers

Answer : DNSSEC

Kerberos is a widely used network authentication mechanism and is used in Windows Active Directory domains and some Unix environments. When implemented in an environment, it has several requirements in order to operate optimally and provide a secure authentication process. Which of the following is not a Kerberos requirement?


Options are :

  • A process to handle the challenge in a challenge-handshake communication (Correct)
  • Time synchronization
  • A method of issuing tickets used for authentication
  • A database of subjects or users

Answer : A process to handle the challenge in a challenge-handshake communication

An administrator is concerned with their organization's upcoming move to the virtual servers. They will have several critical functions on a powerful host server, but the administrator is afraid that one VM might lead to access of another. Which of the following is an effective method for preventing VM escape?


Options are :

  • Virtual machine deployment processes
  • Patching (Correct)
  • Non-persistent virtual machines
  • Firewall rules

Answer : Patching

An attack has just been discovered within a production server. The administrators scramble to collect information in a forensic manner while alerting the authorities. The concern now is how to ensure that evidence of the attack is preserved. Of the following, which can be summarized as the life expectancy of various types of captured data during forensic analysis?


Options are :

  • Chain of evidence
  • Order of volatility (Correct)
  • Delta T
  • Half life

Answer : Order of volatility

A small business's single administrator is investigating proper risk management processes and how to apply them to their software and hardware situations. What is risk management known as when referring to hardware and software?


Options are :

  • Risk redirection
  • Risk control
  • Risk acceptance
  • Information assurance (Correct)

Answer : Information assurance

Smith Industries is modernizing their workplace and is seeking to move away from the traditional copper-based telephone system. The executives explain that they are seeking all-digital telephone communications that can be incorporated into the network improvements they are making. What technology could they choose that allows the use of telephony services over the internet?


Options are :

  • VoIP (Correct)
  • IP
  • TCP
  • DSL

Answer : VoIP

Which of the following is a widely accepted international public key infrastructure (PKI) standard to verify that a public key is matched to the user, host, or application that is contained within the certificate?


Options are :

  • X.222
  • X.509 (Correct)
  • X.302
  • X.550

Answer : X.509

New video streaming operations are being rolled out at Taylor Consulting in order to better accommodate business-wide meetings and discussions. The administrator wants to implement a protocol that will provide audio and video over IP networks and have it secured from tampering and interception. Which protocol should they use?


Options are :

  • SRTP (Correct)
  • IPSec
  • SSL
  • FTPS

Answer : SRTP

A systems administrator is generating a certificate for a developer in the organization. This certificate is not signed by a trusted CA, but it will not be used outside the organization so that does not present a problem. Which of the following is being used in this situation?


Options are :

  • Self-signed certificate (Correct)
  • Published CA certificate
  • Intermediate CA certificate
  • Wildcard certificate

Answer : Self-signed certificate

A sales manager at Acme Inc. receives a call from an individual who identifies herself as a manager at another branch. She states that a customer does not have their membership card and they need to verify membership. What is the term used when an attacker invents a scenario to persuade a victim to divulge information in a social engineering attack?


Options are :

  • Brute force
  • Insider threat
  • Piggybacking
  • Pretexting (Correct)

Answer : Pretexting

After determining the reliability of the company's various business systems, a SysOps manager is now looking to determine the maintenance requirements. They need to know how long it would take to restore a system in the event of an outage. Which of the following provides that information?


Options are :

  • MTBF
  • MTTF
  • RTO
  • MTTR (Correct)

Answer : MTTR

An administrator is interested in prohibiting certain applications from starting up with the system as they have before. These additional applications are not necessary immediately and only need to be open while the user is using them. What command is used to open a configuration window to control startup programs in Windows 7?


Options are :

  • config/startup
  • msconfig (Correct)
  • msstart
  • configms

Answer : msconfig

A junior administrator is shadowing a lead administrator. They are reviewing a system and cleaning out the temporary files and unnecessary data. The junior administrator asks what data websites store locally and why it needs to be cleaned out. What do you call text files that are placed on the local computer as a user browses?


Options are :

  • Cookies (Correct)
  • Flash
  • Content
  • Java

Answer : Cookies

A consultant has been hired to review a customer's network and recommend any improvements. The consultant notes that the network is IPv4 and is using the 10.0.0.0/16 private address space. What type of network has an assigned range from 10.0.0.0 to 10.255.255.255?


Options are :

  • Class B
  • Class D
  • Class C
  • Class A (Correct)

Answer : Class A

A state-sponsored attacker group is seeking to disrupt global communications with a huge search engine. They use the countrywide DNS servers to create a fake DNS record with high priority pointing to a malicious site, and they push it out into the internet. Many users in the region are redirected to the malicious site without their knowledge. What attack changes DNS cache information?


Options are :

  • DNS injection
  • DNS transfer
  • DNS replay
  • DNS poisoning (Correct)

Answer : DNS poisoning

An administrator discovers an incident and confirms it is not a false positive. A web server has been compromised by an attacker, who installed malware that has captured credit card information. The administrator has pulled the hard drive to protect the evidence. If an affected hard drive is to be used as evidence, what should be done prior to any investigation?


Options are :

  • The drive should be purged
  • The drive should be imaged (Correct)
  • The drive should be presented to the authorities as is
  • The drive should be degaussed

Answer : The drive should be imaged

Key stretching is a technique used to enhance the security of stored passwords. There are various common key stretching techniques that incorporate different methods to make a password more secure. Which of the following is based on the Blowfish block cipher and is used in many Unix and Linux distributions?


Options are :

  • BLFKD4
  • PBKDF2
  • Bcrypt (Correct)
  • Cryptfish

Answer : Bcrypt

An administrator is reviewing a system that hosts a secure site for users to track banking information. In addition to hosting the web application, this server also handles the TLS connections between the server and client. Logs are indicating that the system is maxing out its CPU and RAM usage, which is impacting the website speed. Which of the following would enhance this secure website's function?


Options are :

  • Offload encryption functionality to a TLS accelerator (Correct)
  • Limit the number of connections to the server
  • Reduce the number of requests accepted per connection
  • Scale up the server with more RAM and CPU

Answer : Offload encryption functionality to a TLS accelerator

Smith Industries is using multiple VPN servers and wants to centralize the authentication by switching over to a new Cisco VPN that will interface with their Active Directory servers. Which of the following protocols should they use?


Options are :

  • RADIUS
  • Diameter
  • MSCHAP
  • TACACS+ (Correct)

Answer : TACACS+

An administrator has to manage a large set of users grouped by department, and there are sets of permissions that have to be applied to these departments and the sub-departments. What access control model uses a set of permissions instead of individual permissions?


Options are :

  • Role-based (Correct)
  • Trusted
  • Mandatory
  • Discretionary

Answer : Role-based

After deploying a new business system application, a security administrator has discovered a potentially misconfigured piece of software that may lead to a weakness. They are concerned that there may be more, but they are unable to impact the system's performance as it is already in use in the organization. Which of the following should they perform?


Options are :

  • Generate a risk register
  • Penetration test
  • Vulnerability scan (Correct)
  • PING sweep

Answer : Vulnerability scan

As a centralized approach, mandatory access control provides an effective means to govern access to the objects covered by the system. What is an example of an object in a mandatory access control system?


Options are :

  • Users
  • Files (Correct)
  • Permissions
  • Access

Answer : Files

Financial companies handle a large variety of sensitive information relating to their customers, and there have been laws enacted to protect that data and punish violators. Which of the following is a rule that requires financial institutions to provide privacy notices to consumers?


Options are :

  • GLB (Correct)
  • HIPAA
  • SOX
  • HAVA

Answer : GLB

While performing an audit, a security analyst reviews the control types incorporated at Acme Inc. They look at security elements that include fences, warning signs, security guards, mantraps, CCTV, and lighting. These are all examples of which of the following control types?


Options are :

  • Administrative
  • Operational
  • Physical (Correct)
  • Management

Answer : Physical

You are working remotely at a local coffee shop and go to log in to the wireless network. You are presented with a new web browser window that has just popped open, prompting you to accept an agreement before signing on to the free Wi-Fi. What technology have you just encountered?


Options are :

  • Network intrusion prevention
  • MAC filtering
  • Web filter
  • Captive portal (Correct)

Answer : Captive portal

Public and private key cryptography is rather suited for email communications because the sender can provide their public key without fear of the recipient being able to decrypt their messages. Which of the following programs is an asymmetrical encryption method often used to encrypt emails?


Options are :

  • AES
  • PGP (Correct)
  • One-time pad
  • DES

Answer : PGP

An administrator is attempting to troubleshoot a potentially faulty switch. They are wondering whether the switch is keeping the specific port assignments for the various devices. Where is the MAC-to-port translation kept within a switch?


Options are :

  • Virtual memory
  • Server
  • CAM table (Correct)
  • Switch hard drive

Answer : CAM table

A consultant has been hired by a financial startup that is interested in controlling and filtering content for their users on the internet. The consultant recommends using a type of server that will sit between the client and the internet while filtering certain requests and sites. What type of server is the consultant recommending?


Options are :

  • Proxy (Correct)
  • Firewall
  • Router
  • Web

Answer : Proxy

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions