CompTIA SY0-501 Security+ Take Ten Challenge #4

Last modified on June 7th, 2020 at 9:13 am

4-1: A malicious application has circumvented your wireless access point and is communicating directly between devices. Which of the following would BEST describe this technique?
VLAN
NAT
Static routing
Virtualization
Ad hoc

Correct!

Wrong!

4-2: A security administrator would like to authenticate users connecting to a VPN tunnel. This authentication should occur over a secure channel. Which of these would be the BEST choice for this requirement?
LDAPS
HTTP
S/MIME
PAP
ACL

Correct!

Wrong!

4-3: What type of backup makes a copy of all files that were changed since the last full backup?
Incremental
Hybrid
Offline
Differential
Real-time

Correct!

Wrong!

4-4: Robert is sending a document to Alicia, and he'd like to make sure that the contents of the document aren't modified. Which of the following should Robert follow?
Use his private key to digitally sign the document
Use Alicia's public key to digitally sign the document
Use his private key and Alicia's public key to create a shared symmetric key
Use his public key to digitally sign the document
Use Alicia's private key to digitally sign the document

Correct!

Wrong!

4-5: Each time a user starts their browser, a pop-up window appears with a promotion for a local restaurant. Which of the following would best describe this scenario?
Worm
Keylogger
RAT
Adware
Logic bomb

Correct!

Wrong!

4-6: Which of the following could be used to obtain the banner of a service?
tcpdump
netcat
netstat
dig
traceroute

Correct!

Wrong!

4-7: A system administrator would like to limit account permissions to the minimum required for the user to complete their assigned tasks. Which of these would BEST describe this?
Least functionality
EAL
Application whitelisting
TPM
FDE

Correct!

Wrong!

4-8: When checking out laptops, employees must provide a signature. Which of the following would best describe this authentication factor?
Something you are
Something you have
Something you do
Somewhere you are
Something you know

Correct!

Wrong!

4-9: Which of the following would be considered a corrective security control?
Backups
Mantrap
Login banner
Motion detector
Security policy

Correct!

Wrong!

4-10: Which of the following would be the BEST way to randomize a stored password?
Nonce
Block cipher
Salt
Diffusion
Steganography

Correct!

Wrong!

Share the quiz to show your results !

Subscribe to see your results

SY0-501 Take Ten Challenge #4

I got %%score%% of %%total%% right

%%description%%

%%description%%

Loading...

Category: SY0-501 Take Ten Challenges

Comments are closed.

X
My Network+ Study Group is live right now! Click here to join us
My free Live Network+ Study Group is Wednesday. Click here to register!