CompTIA SY0-501 Security+ Take Ten Challenge #7Step 1 of 1010%7-1: A user has noticed applications launching and the mouse moving when they are not using their computer. Which of the following would BEST describe this attack? Keylogger Ransomware RAT Worm DoS 7-2: Which of the following describes this IPS log entry? date=2020-03-01 time=10:59:01 idseq=188803990132097131 subtype="ips" level="alert" sessionid=1035747 srcip=10.88.130.102 dstip=54.83.43.69 srcport=55077 dstport=80 severity="critical" proto=6 service="HTTP" srcint=“lan" dstint=“wan" direction="outgoing" attack=“backdoor: Zeus.Botnet” Infected device communicating to a botnet Inbound traffic from 54.83.43.69 Man-in-the-middle communication Web client traffic to server 54.83.43.69 Denial of service traffic 7-3: Which of the following would describe data-in-use? A packet of data is transmitted from one site to another A database contains a list of all customer addresses A credit card number is encrypted before transmission Core operating system files are stored on a boot drive 7-4: While logging into a payroll application, a user is required to enter a series of numbers from an app on her mobile phone. Which of the following would best describe this task? Something you are Something you have Somewhere you are Something you know Something you do 7-5: A user has digitally signed an email. Which of the following would the recipient use to verify the contents of the message? Symmetric key Public key Private key Ephemeral key 7-6: Overnight, a previously unknown vulnerability in a database server has been used to gain access to nearly all of a company's public-facing servers. Which of the following would BEST describe this situation? Cross-site scripting Replay attack DDoS Zero-day attack Driver manipulation 7-7: A system administrator needs to take servers out of production for security patching without affecting application uptime. Which of the following would be the BEST choice for this requirement? IPS VPN concentrator Proxy Firewall Load balancer 7-8: An application developer has used a series of predefined modules to quickly build an application on a cloud provider's service. Which of the following would describe this deployment model? IaaS Private PaaS Hybrid SaaS 7-9: Which of the following would be the best choice for SSO? RADIUS TACACS Kerberos CHAP PAP 7-10: Which of the following would be considered a compensating security control? Door lock IPS Identification card Corporate security policy UPS