Exam SY0-201 Preparation Questions

Page 2

Question:1 The risks of social engineering can be decreased by implementing: (Select TWO) A. Security awareness training B. Risk assessment policies C. Operating system patching instructions D. Vulnerability testing techniques E. Identity verification methods Answer: A, E Question:2 When a new network device is configured for first-time installation, which of the following is a security threat? A. Denial of Service (DoS) B. Attacker privilege escalation C. Installation of a back door D. Use of default passwords Answer: D Question:3 Which of the following access control models uses subject and object labels? A. Mandatory Access Control (MAC) B. Role Based Access Control (RBAC) C. Rule Based Access Control (RBAC) D. Discretionary Access Control (DAC) Answer: A Question:4 Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Which of the following is considered the weakest encryption? A. SHA B. DES C. RSA D. AES Answer: B Question:5 Which of the following access decisions are based on a Mandatory Access Control (MAC) environment? A. Access control lists B. Ownership C. Group membership D. Sensitivity labels Answer: D Question:6 Most current encryption schemes are based on:

For Latest SY0-201 Exam Questions and study guides- visit- http://www.certsking.com/SY0-201.html


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.