CompTIA SY0-501 Security+ Take Ten Challenge #3

Last modified on June 7th, 2020 at 9:13 am

3-1: On which of the following would you most likely find an SoC?
SCADA
Load balancer
Media player
Firewall
Database server

Correct!

Wrong!

3-2: A system administrator uses a PIN to unlock the door to the data center. Which of these best describes this authentication factor?
Somewhere you are
Something you have
Something you know
Something you do
Something you are

Correct!

Wrong!

3-3: A piece of manufacturing equipment is no longer sold, and individual parts for the equipment are no longer available. Which of the following would best describe the lifetime of this equipment?
MTTR
MTBF
RTO
RPO
MTTF

Correct!

Wrong!

3-4: A system administrator would like to validate all domain name resolution requests made to the corporate web server. Which of the following would provide this functionality?
IPsec
SSH
HTTPS
DNSSEC
SNMPv3

Correct!

Wrong!

3-5: A web server administrator for a large data center needs to store all of the HTTPS encryption keys on a secure storage device. Which of the following would be the best choice for this task?
FDE
FTPS
HSM
TPM
UEFI

Correct!

Wrong!

3-6: Sam, a user in the accounting department, has created a spreadsheet containing employee expense report summaries. Sam assigns file permissions that allows Rodney to read and modify the file. No other permissions are added to the file. What type of access control is in use?
Mandatory access control
Discretionary access control
Rule-based access control
Attribute-based access control
Role-based access control

Correct!

Wrong!

3-7: A security administrator is upgrading all of their physical key door locks to electronic versions. What type of control would best describe this security feature?
Corrective
Preventive
Compensating
Detective
Deterrent

Correct!

Wrong!

3-8: A system administrator has downloaded an important operating system image from a third-party web site. The administrator would like to validate that the downloaded image is identical to the version on the web site. Which of the following would provide this capability?
SHA-2
Diffie-Hellman
ECB
3DES
RC4

Correct!

Wrong!

3-9: A non-salted database of password hashes was stolen from a company, and the list of usernames and plaintext passwords was posted to the Internet a week later. How did the thieves obtain the passwords?
Man-in-the-middle
Hashing
Brute force
Driver manipulation
Phishing

Correct!

Wrong!

3-10: Which of these would be the best way to determine the version of a web server running on a remote device?
ping
Honeypot
Banner grabber
Steganography tool
netstat

Correct!

Wrong!

Share the quiz to show your results !

Subscribe to see your results

SY0-501 Take Ten Challenge #3

I got %%score%% of %%total%% right

%%description%%

%%description%%

Loading...

Category: SY0-501 Take Ten Challenges

Comments are closed.

X