Sy0-501 Security + Practice Test

Uscita

Domanda 1 of 1

  Tempo Rimasto


0 [{"id":417257,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A systems administrator wants to protect data stored on mobile devices that are used to scan and record assets in a warehouse. The control must automatically destroy the secure container of mobile devices if they leave the warehouse. Which of the following should the administrator implement?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":31,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417262,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"An access control model in which every resource has a sensitivity label matching clearance level assigned to a user is called ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":36,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417268,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-05-09 13:37:11","questionName":"A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from his server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":37,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417270,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-04-12 16:02:50","questionName":"A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select TWO). ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":44,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417269,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following can be provided to an AAA system for the identification phase? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":43,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417265,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An employee is being terminated from a company. Which of the following steps is MOST important in the process of disengagement from this employee?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":40,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417260,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"An MS Windows account that enables users to have temporary access to a computer without the capability to install software or hardware, change settings, or create a user password is calle","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":34,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417267,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-05-09 13:37:11","questionName":"The domain administrator account is an example of which kind of account? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":38,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417261,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Solutions providing the AAA functionality include (Select TWO)","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":35,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417266,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-05-09 13:37:11","questionName":"Users continually set weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select TWO). ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":42,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417256,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A systems administrator is implementing a security baseline template on a newly installed server. Which of the following is a benefit of implementing the baseline? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":30,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417264,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An auditor suspects someone in the organization is accessing confidential information after working hours when no one else is around. Which of the following actions can help prevent this specific threat?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":39,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417258,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS attack. An investigation discovers a certain type of refrigerator was exploited and used to send outbound packets to the website that crashed. To which of the following categories does the refrigerator belong? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":32,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417259,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following answers refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":33,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417263,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"A type of access control in computer security where every object has an owner who at his\/her own discretion determines what kind of permissions other users can have to that object is known as","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":41,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
417257
0
60
block

A systems administrator wants to protect data stored on mobile devices that are used to scan and record assets in a warehouse. The control must automatically destroy the secure container of mobile devices if they leave the warehouse. Which of the following should the administrator implement?

Seleziona Le Risposte Corrette  

(0/0)












417262
0
60
none
417268
0
60
none
417270
0
60
none
417269
0
60
none
417265
0
60
none
417260
0
60
none
417267
0
60
none
417261
0
60
none
417266
0
60
none
417256
0
60
none
417264
0
60
none
417258
0
60
none
417259
0
60
none
417263
0
60
none