Security+ SYO-501 PM-A Flashcards

1
Q

Match the description with the most accurate attack type. Not all attack types will be used.

Attacker obtains bank account number and birth date by calling the victim.

A. Hoax
B. Spam
C. Vishing
D. Man-in-the-Middle
E. Social Engineering
F. Spoofing
G. Whaling
H. DDoS
A

C. Vishing (social engineering over the phone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Match the description with the most accurate attack type. Not all attack types will be used.

Attacker modifies a legitimate DNS server to resolve the IP address of a malicious site.

A. Hoax
B. Spam
C. Vishing
D. Man-in-the-Middle
E. Social Engineering
F. Spoofing
G. Whaling
H. DDoS
A

F. Spoofing (Any time a device pretends to be another device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Match the description with the most accurate attack type. Not all attack types will be used.

Attacker intercepts all communication between a client and a web server.

A. Hoax
B. Spam
C. Vishing
D. Man-in-the-Middle
E. Social Engineering
F. Spoofing
G. Whaling
H. DDoS
A

D. Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Match the description with the most accurate attack type. Not all attack types will be used.

Multiple attackers overwhelm a web server

A. Hoax
B. Spam
C. Vishing
D. Man-in-the-Middle
E. Social Engineering
F. Spoofing
G. Whaling
H. DDoS
A

H. DDoS (Distributed Denial of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Match the description with the most accurate attack type. Not all attack types will be used.

A virus alert appears in your browser from Microsoft with a phone number to call for support.

A. Hoax
B. Spam
C. Vishing
D. Man-in-the-Middle
E. Social Engineering
F. Spoofing
G. Whaling
H. DDoS
A

A. Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The security team at a local public library system is creating a set of minimum security standards for the various computer systems used at the library.

Select the BEST security control for each available placeholder. All of the available security controls will be used once.

Security Controls:

A. Video Surveillance
B. Biometric Reader
C. Cable Lock
D. Locking Cabinets
E. Environmental Sensors
F. Full-Disk Encryption
G. Smart Card

Location: Library/Web Server and Database Server
Description: Computer Room/High Security

Select three (3) Security Controls

A

A. Video Surveillance
D. Locking Cabinets
E. Environmental Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The security team at a local public library system is creating a set of minimum security standards for the various computer systems used at the library.

Select the BEST security control for each available placeholder. All of the available security controls will be used once.

Security Controls:

A. Video Surveillance
B. Biometric Reader
C. Cable Lock
D. Locking Cabinets
E. Environmental Sensors
F. Full-Disk Encryption
G. Smart Card

Location: Library/Employee Laptops
Description: Offsite use/Contains PII

A

B. Biometric Reader

F. Full-Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The security team at a local public library system is creating a set of minimum security standards for the various computer systems used at the library.

Select the BEST security control for each available placeholder. All of the available security controls will be used once.

Security Controls:

A. Video Surveillance
B. Biometric Reader
C. Cable Lock
D. Locking Cabinets
E. Environmental Sensors
F. Full-Disk Encryption
G. Smart Card

Location: Library/Lending Systems
Description: Manages the check-in and check-out process

A

G. Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The security team at a local public library system is creating a set of minimum security standards for the various computer systems used at the library.

Select the BEST security control for each available placeholder. All of the available security controls will be used once.

Security Controls:

A. Video Surveillance
B. Biometric Reader
C. Cable Lock
D. Locking Cabinets
E. Environmental Sensors
F. Full-Disk Encryption
G. Smart Card

Location: Digital Newspaper/Reading Lab
Description: Open Area/No supervision/Laptop Computers

A

C. Cable Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank with the BEST secure network protocol for the description:

Accept customer purchases from your primary website

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Synchronize the time across all of your devices

A

NTPsec (Network Time Protocol Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access your switch using a CLI terminal screen

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Talk with customers on scheduled conference calls

A

SRTP (Secure Real-time Transport Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gather metrics from routers at remote sites

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly