CompTIA SY0-301 Exam Flashcards
(104 cards)
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. What should he do to segment that traffic from the other traffic?
Create a voice VLAN
What security tools can Jane, a security administrator, use to deter theft?
Cable locks
What can be implemented on a laptop hard drive to help prevent unauthorized access to data?
Full disk encryption
What network devices allows Jane, a security technician, to perform malware inspection?
NIPS
What is a valid server-role in a Kerberos authentication system?
Ticket granting server
The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. Jane, an administrative assistant, needs access to view one document in network share A to gather data for management reports. What gives accounting and Jane the correct rights to these areas?
Accounting should be given read/write access to network share A and read access to network
share B. Jane should be given read access for the specific document on network share A.
What creates ciphertext by changing the placement of characters?
Transposition cryptography
What malware types uses stealth techniques to conceal itself, cannot install itself without user interaction, and cannot automatically propagate?
Rootkit
When Pete, an employee, leaves a company, what should be updated to ensure Pete’s security access is reduced or eliminated?
CRL
What should Matt, an administrator, change FIRST when installing a new access point?
Default password
A datacenter has two rows of racks which are facing the same direction. Sara, a consultant, recommends the racks be faced away from each other. This is an example of what type of environmental concept?
Hot and cool aisles
What password policy is the MOST effective against a brute force network attack?
Account lockout
What would BEST be used by Sara, the security administrator, to calculate the likelihood of an event occurring?
ARO
What should Matt, an administrator, implement in a server room to help prevent static electricity?
Humidity controls
Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building Sara should immediately implement?
Security awareness training
Pete, an IT security technician, has been tasked with implementing physical security controls for his company’s workstations. What BEST meets this need?
Cable locks
What creates ciphertext by replacing one set of characters for another?
Substitution cryptography
Sara, the IT Manager, would like to ensure that the router and switches are only available from the network administrator’s workstation. What would be the MOST cost effective solution to ensure that only the network administrator can access these devices?
Implement ACLs
A company is performing internal security audits after a recent exploitation on one of their proprietary applications. Sara, the security auditor, is given the workstation with limited documentation regarding the application installed for the audit. What type of testing method is this?
Gray box
A web server sitting in a secure DMZ has antivirus and anti-malware software which updates daily. The latest security patches are applied and the server does not run any database software. A day later, the web server is compromised and defaced. What is the MOST likely type of attack?
Zero day exploit
What protocol is MOST likely associated with network audit logging?
D. SNMP
Pete, a security administrator, is asked to install and configure centralized software to securely manage and collect statistics from all of the company’s network devices. What should the software support?
SNMPv3
A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. What is, by default, would be the BEST choice to accomplish this goal?
Block port 23 on the network firewall
Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department’s server, and the accounting department should not have access to the HR department’s server. The network is separated by switches. What is designed to keep the HR department users from accessing the accounting department’s server and vice-versa?
VLANs