ExamGecko
Home Home / CompTIA / SY0-701

CompTIA SY0-701 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











A manager receives an email that contains a link to receive a refund. After hovering over the link, the manager notices that the domain's URL points to a suspicious link. Which of the following security practices helped the manager to identify the attack?

A.
End user training
A.
End user training
Answers
B.
Policy review
B.
Policy review
Answers
C.
URL scanning
C.
URL scanning
Answers
D.
Plain text email
D.
Plain text email
Answers
Suggested answer: A

Explanation:

The security practice that helped the manager identify the suspicious link is end-user training. Training users to recognize phishing attempts and other social engineering attacks, such as hovering over links to check the actual URL, is a critical component of an organization's security awareness program.

End user training: Educates employees on how to identify and respond to security threats, including suspicious emails and phishing attempts.

Policy review: Ensures that policies are understood and followed but does not directly help in identifying specific attacks.

URL scanning: Automatically checks URLs for threats, but the manager identified the issue manually.

Plain text email: Ensures email content is readable without executing scripts, but the identification in this case was due to user awareness.

To improve the security at a data center, a security administrator implements a CCTV system and posts several signs about the possibility of being filmed. Which of the following best describe these types of controls? (Select two).

A.
Preventive
A.
Preventive
Answers
B.
Deterrent
B.
Deterrent
Answers
C.
Corrective
C.
Corrective
Answers
D.
Directive
D.
Directive
Answers
E.
Compensating
E.
Compensating
Answers
F.
Detective
F.
Detective
Answers
Suggested answer: B, F

Explanation:

The CCTV system and signs about the possibility of being filmed serve as both deterrent and detective controls.

Deterrent controls: Aim to discourage potential attackers from attempting unauthorized actions. Posting signs about CCTV serves as a deterrent by warning individuals that their actions are being monitored.

Detective controls: Identify and record unauthorized or suspicious activity. The CCTV system itself functions as a detective control by capturing and recording footage that can be reviewed later.

Preventive controls: Aim to prevent security incidents but are not directly addressed by the CCTV and signs in this context.

Corrective controls: Aim to correct or mitigate the impact of a security incident.

Directive controls: Provide guidelines or instructions but are not directly addressed by the CCTV and signs.

Compensating controls: Provide alternative measures to compensate for the absence or failure of primary controls.

A systems administrator is working on a defense-in-depth strategy and needs to restrict activity from employees after hours. Which of the following should the systems administrator implement?

A.
Role-based restrictions
A.
Role-based restrictions
Answers
B.
Attribute-based restrictions
B.
Attribute-based restrictions
Answers
C.
Mandatory restrictions
C.
Mandatory restrictions
Answers
D.
Time-of-day restrictions
D.
Time-of-day restrictions
Answers
Suggested answer: D

Explanation:

To restrict activity from employees after hours, the systems administrator should implement time-of-day restrictions. This method allows access to network resources to be limited to specific times, ensuring that employees can only access systems during approved working hours. This is an effective part of a defense-in-depth strategy to mitigate risks associated with unauthorized access during off-hours, which could be a time when security monitoring might be less stringent.

Time-of-day restrictions: These control access based on the time of day, preventing users from logging in or accessing certain systems outside of designated hours.

Role-based restrictions: Control access based on a user's role within the organization.

Attribute-based restrictions: Use various attributes (such as location, department, or project) to determine access rights.

Mandatory restrictions: Typically refer to non-discretionary access controls, such as those based on government or organizational policy.

An organization maintains intellectual property that it wants to protect. Which of the following concepts would be most beneficial to add to the company's security awareness training program?

A.
Insider threat detection
A.
Insider threat detection
Answers
B.
Simulated threats
B.
Simulated threats
Answers
C.
Phishing awareness
C.
Phishing awareness
Answers
D.
Business continuity planning
D.
Business continuity planning
Answers
Suggested answer: A

Explanation:

For an organization that wants to protect its intellectual property, adding insider threat detection to the security awareness training program would be most beneficial. Insider threats can be particularly dangerous because they come from trusted individuals within the organization who have legitimate access to sensitive information.

Insider threat detection: Focuses on identifying and mitigating threats from within the organization, including employees, contractors, or business partners who might misuse their access.

Simulated threats: Often used for testing security measures and training, but not specifically focused on protecting intellectual property.

Phishing awareness: Important for overall security but more focused on preventing external attacks rather than internal threats.

Business continuity planning: Ensures the organization can continue operations during and after a disruption but does not directly address protecting intellectual property from insider threats.

A systems administrator is configuring a site-to-site VPN between two branch offices. Some of the settings have already been configured correctly. The systems administrator has been provided the following requirements as part of completing the configuration:

* Most secure algorithms should be selected

* All traffic should be encrypted over the VPN

* A secret password will be used to authenticate the two VPN concentrators

A.
See the Explanation part for all the Solution
A.
See the Explanation part for all the Solution
Answers
Suggested answer: A

Explanation:

To configure the site-to-site VPN between the two branch offices according to the provided requirements, here are the detailed steps and settings that need to be applied to the VPN concentrators:

Requirements:

Most secure algorithms should be selected.

All traffic should be encrypted over the VPN.

A secret password will be used to authenticate the two VPN concentrators.

VPN Concentrator 1 Configuration:

Phase 1:

Peer IP address: 5.5.5.10 (The IP address of VPN Concentrator 2)

Auth method: PSK (Pre-Shared Key)

Negotiation mode: MAIN

Encryption algorithm: AES256

Hash algorithm: SHA256

DH key group: 14

Phase 2:

Mode: Tunnel

Protocol: ESP (Encapsulating Security Payload)

Encryption algorithm: AES256

Hash algorithm: SHA256

Local network/mask: 192.168.1.0/24

Remote network/mask: 192.168.2.0/24

VPN Concentrator 2 Configuration:

Phase 1:

Peer IP address: 5.5.5.5 (The IP address of VPN Concentrator 1)

Auth method: PSK (Pre-Shared Key)

Negotiation mode: MAIN

Encryption algorithm: AES256

Hash algorithm: SHA256

DH key group: 14

Phase 2:

Mode: Tunnel

Protocol: ESP (Encapsulating Security Payload)

Encryption algorithm: AES256

Hash algorithm: SHA256

Local network/mask: 192.168.2.0/24

Remote network/mask: 192.168.1.0/24

Summary:

Peer IP Address: Set to the IP address of the remote VPN concentrator.

Auth Method: PSK for using a pre-shared key.

Negotiation Mode: MAIN for the initial setup.

Encryption Algorithm: AES256, which is a strong and secure algorithm.

Hash Algorithm: SHA256, which provides strong hashing.

DH Key Group: 14 for strong Diffie-Hellman key exchange.

Phase 2 Protocol: ESP for encryption and integrity.

Local and Remote Networks: Properly configure the local and remote network addresses to match each branch office subnet.

By configuring these settings on both VPN concentrators, the site-to-site VPN will meet the requirements for strong security algorithms, encryption of all traffic, and authentication using a pre-shared key.

Which of the following security concepts is accomplished with the installation of a RADIUS server?

A.
CIA
A.
CIA
Answers
B.
AAA
B.
AAA
Answers
C.
ACL
C.
ACL
Answers
D.
PEM
D.
PEM
Answers
Suggested answer: B

Explanation:

The installation of a RADIUS server (Remote Authentication Dial-In User Service) is primarily associated with the security concept of AAA, which stands for Authentication, Authorization, and Accounting. RADIUS servers are used to manage user credentials and permissions centrally, ensuring that only authenticated and authorized users can access network resources, and tracking user activity for accounting purposes.

Authentication: Verifies the identity of a user or device. When a user tries to access a network, the RADIUS server checks their credentials (username and password) against a database.

Authorization: Determines what an authenticated user is allowed to do. After authentication, the RADIUS server grants permissions based on predefined policies.

Accounting: Tracks the consumption of network resources by users. This involves logging session details such as the duration of connections and the amount of data transferred.

A software developer released a new application and is distributing application files via the developer's website. Which of the following should the developer post on the website to allow users to verify the integrity of the downloaded files?

A.
Hashes
A.
Hashes
Answers
B.
Certificates
B.
Certificates
Answers
C.
Algorithms
C.
Algorithms
Answers
D.
Salting
D.
Salting
Answers
Suggested answer: A

Explanation:

To verify the integrity of downloaded files, a software developer should post hashes on the website. A hash is a fixed-length string or number generated from input data, such as a file. When users download the application files, they can generate their own hash from the downloaded files and compare it with the hash provided by the developer. If the hashes match, it confirms that the files have not been altered or corrupted during the download process.

Hashes: Ensure data integrity by allowing users to verify that the downloaded files are identical to the original ones. Common hashing algorithms include MD5, SHA-1, and SHA-256.

Certificates and Algorithms: Are more related to ensuring authenticity and securing communications rather than verifying file integrity.

Salting: Is a technique used in hashing passwords to add an additional layer of security, not for verifying file integrity.

A company tested and validated the effectiveness of network security appliances within the corporate network. The IDS detected a high rate of SQL injection attacks against the company's servers, and the company's perimeter firewall is at capacity. Which of the following would be the best action to maintain security and reduce the traffic to the perimeter firewall?

A.
Set the appliance to IPS mode and place it in front of the company firewall.
A.
Set the appliance to IPS mode and place it in front of the company firewall.
Answers
B.
Convert the firewall to a WAF and use IPSec tunnels to increase throughput.
B.
Convert the firewall to a WAF and use IPSec tunnels to increase throughput.
Answers
C.
Set the firewall to fail open if it is overloaded with traffic and send alerts to the SIEM.
C.
Set the firewall to fail open if it is overloaded with traffic and send alerts to the SIEM.
Answers
D.
Configure the firewall to perform deep packet inspection and monitor TLS traffic.
D.
Configure the firewall to perform deep packet inspection and monitor TLS traffic.
Answers
Suggested answer: A

Explanation:

Given the scenario where an Intrusion Detection System (IDS) has detected a high rate of SQL injection attacks and the perimeter firewall is at capacity, the best action would be to set the appliance to Intrusion Prevention System (IPS) mode and place it in front of the company firewall. This approach has several benefits:

Intrusion Prevention System (IPS): Unlike IDS, which only detects and alerts on malicious activity, IPS can actively block and prevent those activities. Placing an IPS in front of the firewall means it can filter out malicious traffic before it reaches the firewall, reducing the load on the firewall and enhancing overall security.

Reducing Traffic Load: By blocking SQL injection attacks and other malicious traffic before it reaches the firewall, the IPS helps maintain the firewall's performance and prevents it from becoming a bottleneck.

Enhanced Security: The IPS provides an additional layer of defense, identifying and mitigating threats in real-time.

Option B (Convert the firewall to a WAF and use IPSec tunnels) would not address the primary issue of reducing traffic to the firewall effectively. Option C (Set the firewall to fail open) would compromise security. Option D (Deep packet inspection) could be resource-intensive and might not alleviate the firewall capacity issue effectively.

An organization would like to calculate the time needed to resolve a hardware issue with a server. Which of the following risk management processes describes this example?

A.
Recovery point objective
A.
Recovery point objective
Answers
B.
Mean time between failures
B.
Mean time between failures
Answers
C.
Recovery time objective
C.
Recovery time objective
Answers
D.
Mean time to repair
D.
Mean time to repair
Answers
Suggested answer: D

Explanation:

Mean time to repair (MTTR) describes the time needed to resolve a hardware issue with a server. MTTR is a key metric in risk management and maintenance that measures the average time required to repair a failed component or system and restore it to operational status.

Recovery point objective (RPO): Defines the maximum acceptable amount of data loss measured in time. It is the point in time to which data must be restored after a disaster.

Mean time between failures (MTBF): Measures the average time between failures of a system or component, indicating reliability.

Recovery time objective (RTO): Defines the maximum acceptable length of time to restore a system after a disaster or disruption.

Mean time to repair (MTTR): Measures the average time required to repair a failed component or system.

An organization is required to maintain financial data records for three years and customer data for five years. Which of the following data management policies should the organization implement?

A.
Retention
A.
Retention
Answers
B.
Destruction
B.
Destruction
Answers
C.
Inventory
C.
Inventory
Answers
D.
Certification
D.
Certification
Answers
Suggested answer: A

Explanation:

The organization should implement a retention policy to ensure that financial data records are kept for three years and customer data for five years. A retention policy specifies how long different types of data should be maintained and when they should be deleted.

Retention: Ensures that data is kept for a specific period to comply with legal, regulatory, or business requirements.

Destruction: Involves securely deleting data that is no longer needed, which is part of the retention lifecycle but not the primary focus here.

Inventory: Involves keeping track of data assets, not specifically about how long to retain data.

Certification: Ensures that processes and systems meet certain standards, not directly related to data retention periods.

Total 350 questions
Go to page: of 35