SY0-201 - CompTIA Security+ Certification Exam (2008)
Go back to
Which of the following is the primary purpose of a honeypot?
To provide a decoy target on the network
Which of the following is an exploit against a device where only the hardware model and manufacturer are known?
Which of the following is placed in promiscuous mode, in line with the data flow, to allow a NIDS to monitor the traffic?
To prevent the use of stolen PKI certificates on web servers, which of the following should an administrator ensure is available to their web servers?
Which of the following would allow a technician to compile a visual view of an infrastructure?
Network security administrators should implement which of the following to ensure system abuse by administrators does not go undetected in the logs?
Separation of duties
All of the following are part of the disaster recovery plan EXCEPT:
patch management softwarE.
Which of the following is LEAST likely to help reduce single points of failure?
Which of the following allows for a user to have only the minimum level of access required for their job duties?
All of the following are logical access control methods EXCEPT:
An application that gets downloaded onto a system by appearing to be a useful tool for cleaning out duplicate contacts in a users emails would be considered:
Which of the following allows for notification when a hacking attempt is discovered?
Which of the following processes are used to monitor and protect the DNS server?
Check DNS records regularly.
Restricting access to files based on the identity of the user or group is an example of which of the following?
When using a single sign-on method, which of the following could adversely impact the entire network?
Which of the following is an attack which is launched from multiple zombie machines in attempt to bring down a service?
Port 3535 is typically blocked for outbound traffic on a companys LAN. An end-user has recently purchased a legitimate business program that needs to make outbound calls using this port. Which of the following steps should a technician take to allow this? (Select TWO).
Open the port on the companys firewall.
Open the port on the users personal software firewall.
One of the security benefits to using virtualization technology is:
if an instance is compromised the damage can be compartmentalizeD.
Which of the following could involve moving physical locations every two years to help mitigate security risks?
Which of the following would allow for a network to remain operational after a T1 failure?
A user complains that the color laser printer continuously gives an access denied message while attempting to print a text document. The administrator logs onto the PC and prints successfully. Which of the following should the administrator check FIRST?
That the user has sufficient rights to print to the printer
Which of the following security steps must a user complete before access is given to the network?
Identification and authentication
Which of the following is considered the weakest encryption?
Which of the following encryption algorithms is decrypted in the LEAST amount of time?
Which of the following would give a technician the MOST information regarding an external attack on the network?
Which of the following would a former employee MOST likely plant on a server that is not traceable?
Which of the following BEST describes a private key in regards to asymmetric encryption?
The key owner has exclusive access to the private key.
An organization has recently implemented a work from home program. Employees need to connect securely from home to the corporate network. Which of the following encryption technologies might BEST accomplish this?
Which of the following allows for a secure connection to be made through a web browser?
All of the following are where backup tapes should be kept EXCEPT:
near a power linE.
Which of the following is the BEST solution to implement to reduce unsolicited email?
Which of the following is an example of two-factor authentication for an information system?
ATM card and PIN
Which of the following would allow an administrator to find weak passwords on the network?
A rainbow table
Which of the following BEST allows a technician to mitigate the chances of a successful attack against the wireless network?
Implement an authentication system and WPA.
A technician is rebuilding the infrastructure for an organization. The technician has been tasked with making sure that the virtualization technology is implemented securely. Which of the following is a concern when implementing virtualization technology?
The technician should verify that the virtual servers and the host have the latest service packs and patches applieD.
An instance where a biometric system identifies unauthorized users and allows them access is called:
When deploying 50 new workstations on the network, which of following should be completed FIRST?
Apply the baseline configuration.
Which of the following algorithms have the smallest key space?
A single sign-on requires which of the following?
A unified trust model
If a company has a distributed IT staff, each being responsible for separate facilities, which of the following would be the BEST way to structure a directory information tree?
Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?
A technician wants to be able to add new users to a few key groups by default, which of the following would allow this?
Steganography could be used by attackers to:
hide and conceal messages in WAV files.
An administrator wants to ensure that that no equipment is damaged when there is a fire or false alarm in the server room. Which of the following type of fire suppression systems should be used?
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?
Which of the following is the MOST appropriate type of software to apply on a workstation that needs to be protected from other locally accessible workstations?
Personal software firewall
When placing a NIDS onto the network, the NIC has to be placed in which of the following modes to monitor all network traffic?
An unauthorized user intercepted a users password and used this information to obtain the companys administrator password. The unauthorized user can use the administrators password to access sensitive information pertaining to client datA. Which of the following is this an example of?
Which of the following type of fire suppression tools would cause the MOST damage to electrical equipment?
Which of the following provides the BEST mechanism for non-repudiation?