CompTIA SY0-501 Security+ Take Ten Challenge #8Step 1 of 1010%8-1: A web site owner would like to provide a method for users to verify downloaded files. Which of the following would be the BEST choice for this requirement? ECB MD5 AES Blowfish Diffie-Hellman 8-2: An encrypted document was downloaded by an attacker, and four hours later the decrypted version of the document was posted online. Which of the following would be the MOST likely reason for this security issue? Untrained users Weak cipher Invalid digital signature Race condition End-of-life vulnerability 8-3: A security administrator would like to maintain a centralized record of events from all switches, routers, and servers. Which of the following would provide this information? Proxy Network access control Data loss prevention Firewall SIEM 8-4: A large enterprise needs a secure method of backing up and maintaining web server encryption keys. Which of the following would BEST fit this requirement? UTM HSM GCM TPM MDM 8-5: During login, a user is required to enter a username, password, and group of numbers from a phone app. Every thirty seconds, the numbers change to a different random group of values. Which of the following would BEST describe this authentication factor? BYOD Code signing TOTP Something you do Hash 8-6: Which of the following would be the LEAST volatile? File in the /temp folder Application executable file ARP table CPU register Network topology 8-7: Which of the following certificate formats would be the BEST choice to send as an email message? RSA PKCS #12 DER MD5 PEM 8-8: Which of the following would BEST describe malware that resides on a user's computer and proxies all incoming and outgoing traffic? DoS Replay attack Man-in-the-browser Spoofing Phishing 8-9: A security administrator would like to create a graphical map of the local workstations and servers. Which of the following tools would be the BEST choice for this task? Vulnerability scanner Network scanner Exploitation framework Data sanitization tool Steganography utility 8-10: A computer in a data center has been labeled as EAL4. Which of the following would BEST describe this system? The computer is only accessible during certain times of the day The operating system meets a specific security baseline The computer is not connected to the Internet This computer receives patches every four days This computer is running the fourth version of the system image