pencil-icon
Build your own quiz

Computers, Other

Professional Development

Image

SY0-501 Practice Quiz 8

0
plays

50 questions

Show Answers
See Preview
  • 1. Multiple Choice
    1 minute
    1 pt

    A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists form the vendor. Which of the following BEST describes the reason why the vulnerability exists?

    Default configuration

    End-of-life system

    Weak cipher suite

    Zero-day threats

  • 2. Multiple Choice
    1 minute
    1 pt

    An organization uses SSO authentication for employee access to network resources. When an employee resigns, as per the organization's security policy, the employee's access to all network resources is terminated immediately. Two weeks later, the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server. Which of the following represents the BEST course of action?

    Approve the former employee's request, as a password reset would give the former employee access to only the human resources server.

    Deny the former employee's request, since the password reset request came from an external email address.

    Deny the former employee's request, as a password reset would give the employee access to all network resources

    Approve the former employee's request, as there would not be a security issue with the former employee gaining access to network

  • 3. Multiple Choice
    1 minute
    1 pt

    Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping?

    Encrypt it with Joe's private key.

    Encrypt it with Joe's public key.

    Encrypt it with Ann's private key.

    Encrypt it with Ann's public key.

  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?