CompTIA SY0-601 Security+ Take Ten Challenge #1Step 1 of 1010%1-1: Which of these would provide a connection between smartphones without the use of an access point? Honeypot DMZ Ad hoc Extranet VPN 1-2: Which of the following is responsible for enforcing rules during a cybersecurity exercise? Purple team Red team White team Blue team 1-3: Which of the following would be considered an authentication attribute? Something you have Something you know Somewhere you are Something you are 1-4: Which of the following is used by WPA3 to prevent PSK brute force attacks? AES CCMP Strong passwords SAE 1-5: A security team has been asked to document information in the Diamond Model. Which of the following BEST describes this model? Intrusion analysis Application containerization Disaster recovery process Encryption complexity 1-6: Which of the following companies would be MOST likely to manage PHI? Credit card services Surgery center Airport transportation Car manufacturing 1-7: An attacker is modifying data sent in real-time between two devices. Which of the following attacks is MOST likely in use? On-path Denial of service Wireless jamming MAC flooding 1-8: What type of wireless network security limits access using physical hardware addresses? WPA2 SSID suppression WPS MAC filtering Static IP addressing 1-9: Which of the following would be the BEST way to monitor a cloud-based microservice architecture? IPsec SNMP traps IPS API inspection 1-10: Which of the following would be the BEST method of sending data to a specific port number on a remote device? traceroute route netcat dig