Sy0-501 Security + Practice Test

Exit

Question 1 of 1

  Time Left


0 [{"id":417239,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of: ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417237,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that has a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists from the vendor. Which of the following BEST describes the reason why the vulnerability exists? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417236,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"While performing a penetration test, the technicians want their efforts to go unnoticed for as long as possible while they gather useful data about the network they are assessing. Which of the following would be the BEST choice for the technicians? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417226,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Windows command-line utility for displaying intermediary points on the packet route is called ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417234,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417245,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"Which of the answers listed below refers to a firmware interface designed as a replacement for BIOS? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417227,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417233,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technician must ensure the OS settings are hardened. Which of the following is the BEST way to do this? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417243,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"Which of the following acronyms refers to a policy of permitting employees to bring personally owned mobile devices and to use those devices for accessing privileged company information and applications? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417235,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A security administrator suspects a MITM attack aimed at impersonating the default gateway is underway. Which of the following tools should the administrator use to detect this attack? (Select TWO).","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417231,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan, which of the following requirements is MOST likely to influence this decision? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417232,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following could be used to determine if a compromised system still has an active connection?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417230,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"When a system or software is not supported by the original vendor, it is a vulnerability known as: ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417228,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"A security professional is conducting a penetration test. She has not been given information about any software or network architecture. Which of the following BEST describes the test being performed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417229,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A penetration tester is crawling a public website. Which of the following represents the actions the penetration test is performing? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
417239
0
60
block

An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:

Select the Correct Answers  

(0/0)












417237
0
60
none
417236
0
60
none
417226
0
60
none
417234
0
60
none
417245
0
60
none
417227
0
60
none
417233
0
60
none
417243
0
60
none
417235
0
60
none
417231
0
60
none
417232
0
60
none
417230
0
60
none
417228
0
60
none
417229
0
60
none