Sy0-501 Security + Practice Test

Wyjście

Pytanie 1 of 1

  Pozostały Czas


0 [{"id":417237,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that has a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists from the vendor. Which of the following BEST describes the reason why the vulnerability exists? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417226,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Windows command-line utility for displaying intermediary points on the packet route is called ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417239,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of: ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417229,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A penetration tester is crawling a public website. Which of the following represents the actions the penetration test is performing? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417243,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"Which of the following acronyms refers to a policy of permitting employees to bring personally owned mobile devices and to use those devices for accessing privileged company information and applications? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417231,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan, which of the following requirements is MOST likely to influence this decision? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417235,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A security administrator suspects a MITM attack aimed at impersonating the default gateway is underway. Which of the following tools should the administrator use to detect this attack? (Select TWO).","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417233,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technician must ensure the OS settings are hardened. Which of the following is the BEST way to do this? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417232,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following could be used to determine if a compromised system still has an active connection?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417245,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"Which of the answers listed below refers to a firmware interface designed as a replacement for BIOS? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417227,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417228,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"A security professional is conducting a penetration test. She has not been given information about any software or network architecture. Which of the following BEST describes the test being performed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417236,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"While performing a penetration test, the technicians want their efforts to go unnoticed for as long as possible while they gather useful data about the network they are assessing. Which of the following would be the BEST choice for the technicians? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417234,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417230,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"When a system or software is not supported by the original vendor, it is a vulnerability known as: ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
417237
0
60
block

A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that has a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists from the vendor. Which of the following BEST describes the reason why the vulnerability exists?

Wybierz prawidłowe odpowiedzi  

(0/0)












417226
0
60
none
417239
0
60
none
417229
0
60
none
417243
0
60
none
417231
0
60
none
417235
0
60
none
417233
0
60
none
417232
0
60
none
417245
0
60
none
417227
0
60
none
417228
0
60
none
417236
0
60
none
417234
0
60
none
417230
0
60
none