50 Practice Questions - Security+ Certification SY0-701
50 Practice Questions - Security+ Certification SY0-701
🙁
d) conducting a risk analysis <-
i) Correta: letra C
39)A secutiry professional notices that an unauthorized device has been used to copy
the signals from legitimate RFID tags, allowing unauthorized access to a secure
area. What type of physical attack is described in the scenario, and how does it
work?
a) environmental attack <-
b) brute force attack
c) cloning attack
d) social engineering
i) Correta: letra C. Eu pensei nela, clonar as tags, mas pensei que isso
seria também um ataque “de ambiente”, pq o atacante nem precisaria
estar dentro da empresa, mas próximo, usando algum tipo de
captador de radiofrequência, sei lá.
40)A security technician discovers that an attacker has gained access to a network and
positioned themselves in a way that allows them to intercept and manipulate network
traffic. What type of attack is described in the scenario, and how is the attacker
positioned?
a) the scenario describes a malicious code attack targeting network devices
b) the scenario describes an on-path attack <- (é o MITM)
c) the scenario describes a rootkit installed on a server
d) the scenario describes a security professional conducting a penetration test
41)An organization enforces mobile devices management (MDM) policies to secure and
manage employee-owned smartphones and tables used for work. In the context of
mobile device security, what is the organization primarily achieving when enforcing
mobile device management (MDM) policies for employee-owned smartphones and
tablets?
a) secure data destruction
b) data encryption
c) endpoint security <-
d) risk acceptance
42)What type of reconnaissance activity is a security professional primarily engaged in
when gathering information about potential vulnerabilities on the organization’s
external network by reviewing job posting or message boards about the
organization?
a) passive reconnaissance <-
b) active reconnaissance
c) defensive penetration testing
d) known evironment testing
43)An organization implements MFA for its employees’ access to sensitive systems and
resources. What security measure is the organization primarily implementing when
implementing MFA?
a) threat analysis
b) user authentication <-
c) security awareness training
d) access control
i) Nota: se estou correto, MFA tem a ver com “multiple factor
authentication”, portanto, tem a ver com autenticação do usuário
44)A security technician analyzes network traffic logs to identify patterns indicative of a
potential distributed denial-of-service (DDoS) attack. In the context of threat detection
and analysis, what action is the security technician primarily taking when analyzing
network traffic logs to identify patterns indicative of a potential DDoS attack?
a) intrusion prevention
b) threat hunting <-
c) risk assessment
d) risk mitigation
45)An organization enforces mobile device encryption policies to ensure that data stored
on employees’ smartphones and tablets is protected from unauthorized access in
case of device loss or theft. What security measure is the organization primarily
implementing by enforcing mobile device encryption policies?
a) data integrity
b) data confidentiality
c) data availability
d) data authentication <-
i) Correta: letra B - fiquei muito na dúvida entre as duas, mas pela
explicação fez sentido: confidentiality vai impedir que a pessoa não
autorizada veja os dados (que estão criptografados) - mas pensei em
authentication, pq a pessoa não autorizada, não conseguiria
autenticar, por exemplo, na VPN ou algo assim e não veria os dados,
maybe…
46)A security technician is responsible for designing the network infrastructure of a
critical government agency. They need to ensure that certain sensitive systems are
physically isolated from the rest of the network to prevent unauthorized access.
Which network design technique should the security technician implement to achieve
physical isolation of sensitive systems?
a) logical segmentation
b) software-defined networking (SDN)
c) virtualization
d) air-gapped <-
i) NOTA: logical não é physical, software-defined não tem a ver (na
minha visão rs), virtualization não é physical… Mas, para garantir,
como eu nunca tinha lido “air-grapped” pesquisei a definição básica e,
BUM, é essa a resposta. Eu fui pela exclusão, mas agora tenho
certeza. Isolamento físico pode ser chamado de air-gapped.
47)A bank requires all of its vendors to implement measures to prevent data loss on
stolen laptops. Which strategy is the bank demanding?
a) disk encryption <-
b) data permission
c) information categorization
d) access right limitations
48)To ensure software code authenticity in a development environment, which method
should a software develpment manager implement?
a) regular code reviews
b) dynamic application security testing
c) code signing <-
d) implementing agile methodologies
49)In a corporate network, the IT department wants to implement a solution that divides
the network based on security requirements. What mitigations technique is the IT
department planning to implement to enhance network security in this scenario?
a) least privilege
b) patching
c) segmentation <-
d) encryption
50)Security protocols in a cloud data center are under review to guarantee the protection
of the safety of the data center staff. Which of the following best illustrates the
appropriate setup for these security controls?
a) external gateway access points should fail closed
b) data access logs should fail open
c) fire safety mechanisms should fail open <-
d) user authentication systems should fail closed
i) NOTA: chutei absurdamente pq não entendi muito bem a questão,
mas pensei: se é cloud e quer proteger o data center staff, deve ser
alguma coisa física, portanto, fire safety faria sentido. A dúvida maior
foi quanto ao termo “fail open” e “fail closed”