100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SANS - SEC530 exam questions with well verified answers

Rating
-
Sold
-
Pages
81
Grade
A+
Uploaded on
29-06-2025
Written in
2024/2025

Which of the following is a recommended USB keyboard mitigation for sites requiring high security? A) Disable USB ports in the system. B) Restrict USB devices with approved PIDs and VIDs. C) Block the USB devices physically. D) Restrict USB devices with approved user accounts. - correct answer C) Block the USB devices physically. Which of the following Cisco IOS commands is used to shut the port down automatically when the maximum number of MAC addresses is exceeded? A) switchport port-security violation shutdown B) switchport port-security limit rate source-mac-shutdown C) switchport port-security violation auto-shutdown D) switchport port-security mac-exceed-port-shutdown - correct answer A) switchport port-security violation shutdown What is a common failing associated with focusing only on compliance-drive security? A) Compliance-driven security tends to focus only on hardening internal systems. B) Compliance-driven security tends to focus only on hardening the perimeter. C) Compliance-driven security tends to be costly in terms of solutions and resources. D) Compliance-driven security tends to fail in the face of a persistent adversary. - correct answer D) Compliance-driven security tends to fail in the face of a persistent adversary. Which of the following is described by Lockheed Martin as a countermeasure action to the Kill Chain?

Show more Read less
Institution
SANS
Course
SANS











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS
Course
SANS

Document information

Uploaded on
June 29, 2025
Number of pages
81
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS - SEC530
Which of the following is a recommended USB keyboard mitigation for sites requiring high
security?



A) Disable USB ports in the system.

B) Restrict USB devices with approved PIDs and VIDs.

C) Block the USB devices physically.

D) Restrict USB devices with approved user accounts. - correct answer C) Block the USB devices
physically.



Which of the following Cisco IOS commands is used to shut the port down automatically when
the maximum number of MAC addresses is exceeded?



A) switchport port-security violation shutdown

B) switchport port-security limit rate source-mac-shutdown

C) switchport port-security violation auto-shutdown

D) switchport port-security mac-exceed-port-shutdown - correct answer A) switchport port-
security violation shutdown



What is a common failing associated with focusing only on compliance-drive security?



A) Compliance-driven security tends to focus only on hardening internal systems.

B) Compliance-driven security tends to focus only on hardening the perimeter.

C) Compliance-driven security tends to be costly in terms of solutions and resources.

D) Compliance-driven security tends to fail in the face of a persistent adversary. - correct answer
D) Compliance-driven security tends to fail in the face of a persistent adversary.



Which of the following is described by Lockheed Martin as a countermeasure action to the Kill
Chain?

,SANS - SEC530

A) Disrupt

B) Prevent

C) React

D) Remove - correct answer A) Disrupt



What is an easy to implement and effective control an organization can leverage to make
pivoting more difficult for an attacker?



A) WPA2

B) P2P patching

C) Private VLAN

D) VPN - correct answer C) Private VLAN



Which type of private VLAN ports may only communicate with promiscuous ports?



A) Isolated

B) Promiscuous

C) Network

D) Community - correct answer A) Isolated



Which of the following wireless standards supports up to 1300 Mbps?



A) 802.11b

B) 802.11ac

C) 802.11n

,SANS - SEC530
D) 802.11w - correct answer B) 802.11ac



In which phase of the security architecture design lifecycle is threat modeling and attack surface
analysis conducted?



A) Scan

B) Discover and Assess

C) Plan

D) Design - correct answer C) Plan



Which of the following is the best practice to mitigate against the Cisco Discovery Protocol (CDP)
information leakage attack?



A) Disable the CDP unless expressly required.

B) No mitigations are needed since CDP is secure by default.

C) Schedule the CDP patch regularly.

D) Enable the SECDP feature in the CDP to secure the CDP. - correct answer A) Disable the CDP
unless expressly required.



Which of the following prevents physical access to the network when plugging in an
unauthorized device?



A) MAC address filtering

B) Packet filtering firewall

C) Background checks

D) Two-factor authentication - correct answer A) MAC address filtering

, SANS - SEC530
What would be one of the first steps for a security architect when building or redesigning a
security architecture to secure an organization?



A) Remove unnecessary egress traffic

B) Perform a perimeter pen test

C) Deploy patches to external systems

D) Identify critical assets - correct answer D) Identify critical assets



Which of the following is a method of detecting a BYOAP problem on a network?



A) Multiple VPN connections from the internal network.

B) Multiple URL requests from the same source IP.

C) Multiple SSIDs in the area.

D) Multiple user agent strings from the same IP address. - correct answer D) Multiple user agent
strings from the same IP address.



What could be implemented to mitigate the risk of one client pivoting to another on the same
network?



A) Host-based antipivot

B) Next-gen antivirus

C) NAC controls

D) Private VLANs - correct answer D) Private VLANs



What is the term used for when the red team is working together with the blue team through
simulation of specific threat scenarios?
$10.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Beckham

Get to know the seller

Seller avatar
Beckham Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 year
Number of followers
0
Documents
199
Last sold
3 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions