CompTIA SY0-601 Security+ Take Ten Challenge #3Step 1 of 1010%3-1: Which of the following would be MOST associated with AIS? Data exfiltration 0-day attacks Encrypted tunnel Syslog STIX and TAXII 3-2: A database has been modified so that every person listed in the database has been replaced with a completely different first and last name. Which of the following would BEST describe this modification? Intelligence fusion Fake telemetry Pseudonymization OSINT Proxy 3-3: A user inputs a PIN during the login process. Which of the following would describe this authentication method? Push notification Federation TOTP Attestation Static code 3-4: Which of these best describes authentication that is genuine with high confidence? Hashing Counterintelligence Integrity E-discovery Non-repudiation 3-5: Which of the following would be the BEST example of a detective security control? Security policy Hot site Fence Backup IPS 3-6: Which of these would BEST describe a ZIP bomb? Directory traversal Resource exhaustion NULL pointer dereference API attack Memory leak 3-7: Which of the following would be the best way to prevent a worm entering the network through a USB flash drive? NGFW DLP DNS sinkhole SIEM Screened subnet 3-8: Which of the following is commonly used to verify device drivers during Windows startup? 802.1X ELAM RBAC HSM TPM 3-9: A pentester is gathering OSINT prior to a scheduled test. Which of the following would be the BEST choice for this task? Nmap Cuckoo Nessus theHarvester curl 3-10: A prospective employee was dropped from a job consideration after receiving the results of a background check. Which of the following describes this process? Offboarding Adverse action NDA Contingency planning PII