Sy0-501 Security + Practice Test

Uscita

Domanda 1 of 1

  Tempo Rimasto


0 [{"id":417235,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A security administrator suspects a MITM attack aimed at impersonating the default gateway is underway. Which of the following tools should the administrator use to detect this attack? (Select TWO).","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417236,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"While performing a penetration test, the technicians want their efforts to go unnoticed for as long as possible while they gather useful data about the network they are assessing. Which of the following would be the BEST choice for the technicians? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417239,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of: ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417232,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following could be used to determine if a compromised system still has an active connection?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417233,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technician must ensure the OS settings are hardened. Which of the following is the BEST way to do this? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417226,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Windows command-line utility for displaying intermediary points on the packet route is called ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417230,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"When a system or software is not supported by the original vendor, it is a vulnerability known as: ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417229,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A penetration tester is crawling a public website. Which of the following represents the actions the penetration test is performing? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417243,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"Which of the following acronyms refers to a policy of permitting employees to bring personally owned mobile devices and to use those devices for accessing privileged company information and applications? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417231,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan, which of the following requirements is MOST likely to influence this decision? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417245,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"Which of the answers listed below refers to a firmware interface designed as a replacement for BIOS? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417237,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that has a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists from the vendor. Which of the following BEST describes the reason why the vulnerability exists? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417228,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"A security professional is conducting a penetration test. She has not been given information about any software or network architecture. Which of the following BEST describes the test being performed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417227,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417234,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
417235
0
60
block

A security administrator suspects a MITM attack aimed at impersonating the default gateway is underway. Which of the following tools should the administrator use to detect this attack? (Select TWO).

Seleziona Le Risposte Corrette  

(0/0)
















417236
0
60
none
417239
0
60
none
417232
0
60
none
417233
0
60
none
417226
0
60
none
417230
0
60
none
417229
0
60
none
417243
0
60
none
417231
0
60
none
417245
0
60
none
417237
0
60
none
417228
0
60
none
417227
0
60
none
417234
0
60
none