New updated CompTIA FC0-U61 exam questions from Lead4Pass CompTIA FC0-U61 dumps! Welcome to download the latest Lead4Pass CompTIA FC0-U61 dumps with PDF and VCE: https://www.leads4pass.com/fc0-u61.html (146 Q&As)
Latest update CompTIA FC0-U61 exam questions and answers online practice test
QUESTION 1 Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rainstorm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem? A. The power interruption caused the camera to malfunction. B. Ann has a compatibility problem with the camera. C. A firmware update needs to be applied to the camera. D. Ann\\’s Internet connection and wireless router are still down. Correct Answer: D
QUESTION 2 Which of the following would MOST likely prevent malware sent as a compromised file via email from infecting a person\\’s computer? A. Email previewing B. Patching C. Clear browsing cache D. Kill process Correct Answer: B
QUESTION 3 SQL databases use primary and foreign keys to enable which of the following? A. Rows B. Fields C. Schemas D. Relationships Correct Answer: D
QUESTION 4 Which of the following database concepts would MOST likely use a CSV file? A. Data querying B. Data reports C. Data importing D. Data persistence Correct Answer: B
QUESTION 5 An IP address is 32 bits long. If converted to bytes, it would be: A. 4 bytes B. 8 bytes C. 16 bytes D. 64 bytes Correct Answer: A
QUESTION 6 A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open? A. Antivirus B. Anti-malware C. Device Manager D. Host firewall Correct Answer: D
QUESTION 7 Which of the following is a reason why complex passwords are required? A. To encourage password variety B. To prevent someone from guessing them C. To make them harder to remember D. To reduce social engineering attacks Correct Answer: B
QUESTION 8 A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this? A. Perform process management. B. Perform task scheduling. C. Set the system date and time. D. Set a reminder to run the script. Correct Answer: B
QUESTION 9 When developing a game, a developer creates a boss object that has the ability to jump. Which of the following What programming concepts does jump represent? A. Method B. Object C. Property D. Attribute Correct Answer: D
QUESTION 10 Which of the following is a value that uniquely identifies a database record? A. Foreign key B. Public key C. Primary key D. Private key Correct Answer: C
QUESTION 11 A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue? A. Checking the proxy settings B. Checking that caching is enabled C. Checking browser add-ons D. Checking certificate validity Correct Answer: D
QUESTION 12 Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output? A. Oatmeal B. Bacon and eggs C. Waffles D. Pancakes Correct Answer: C
QUESTION 13 A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user\\’s needs? A. T1 line B. Satellite C. Fiber optic D. DSL Correct Answer: C
The above content: shared FC0-U61 exam pdf, FC0-U61 Exam Questions And Answers, FC0-U61 exam video, and get the complete FC0-U61 exam dump path. For information about FC0-U61 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/fc0-u61.html (146 Q&A)
New updated CompTIA N10-007 exam questions from Lead4Pass CompTIA N10-007 dumps! Welcome to download the latest Lead4Pass CompTIA N10-007 dumps with PDF and VCE: https://www.leads4pass.com/n10-007.html (1148 Q&As)
Latest update CompTIA N10-007 exam questions and answers online practice test
QUESTION 1 An end-user at an Internet cafe tries to visit an online retailer\\’s website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitor\\’s page still loads. Which of the following BEST describes what is occurring? A. Cross-site scripting B. Session hijacking C. Man in the middle D. DNS poisoning Correct Answer: D
QUESTION 2 A small company has decided to use a single virtual appliance to filter spam as well as a reverse proxy and filter traffic to its internal webserver. Which of the following has the company MOST likely deployed? A. IPS B. Firewall C. SIEM D. UTM E. Content filter Correct Answer: E
QUESTION 3 A network technician has recently installed new VoIP phones at all employees\\’ desks to support a new SIP cloud solution. However, the technician is unable to make a call from the device after testing. Which of the following should the technician verify? A. TCP 433 is allowed. B. UDP 1720 is allowed. C. UDP 50860 is allowed. D. UDP 5061 is allowed. E. TCP 8080 is allowed. F. TCP 8181 is allowed. Correct Answer: CD
QUESTION 4 A technician needs to manage a Linux-based system from the GUI remotely. Which of the technician should the Does the technician deploy? A. RDP B. SSH C. VNC D. Telnet Correct Answer: B
QUESTION 5 Which of the following BEST describes the BGP routing protocol? A. distance vector B. hybrid C. static D. link-state Correct Answer: B
QUESTION 6 A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel\\’s patch panel to the jack, and the distance is within Cat 5e specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly? A. Place a switch at the hotel\\’s patch panel for connecting each room\\’s cables B. Place a switch on each table to ensure strong connectivity C. Place repeaters between the patch panel and the rooms D. place a switch at the wall jack and run the cables in the room from there Correct Answer: D
QUESTION 7 While troubleshooting a connectivity issue, a network technician successfully pinged the loopback address and external DNS server tut was unable to ping the website\\’s URL Which of the following tools should the technician use to determine where the network issue is located? A. Nmap B. netstat C. nslookup D. ipconftg E. tracert Correct Answer: E
QUESTION 8 A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that ports are reported as closed. Which of the following BEST explains this response? A. The ports belong to an active system and are denying requests B. The ports are associated with deprecated services C. The ports do not belong to a live system D. The ports replied with an SYN/ACK response Correct Answer: B
QUESTION 9 A network technician has established an internal HTTP connection from a browser to the webserver to access an organization\\’s intranet services in which of the following layers of the OSI model is the HTTP protocol found? A. Session B. Datalink C. Network D. Application Correct Answer: A
QUESTION 10 A network administrator has created a new VLAN for the server and clients within the accounting department and wants to outline how it integrates with the existing network. Which of the following should the administrator create? A. Logical diagram B. Physical diagram C. Rack diagram D. Configuration diagram Correct Answer: A
QUESTION 11 A company runs Linux servers in its own data center and also on a popular public cloud service provider. The servers hosted by the cloud provider can only be accessed with proper authorization and are only accessed by the company\\’s datacenter. Which of the following BEST describes the type of cloud architecture being used? (Choose two.) A. Private B. Hybrid C. Public D. IaaS E. PaaS F. SaaS Correct Answer: BD
QUESTION 12 An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO). A. Allow TCP port 23 B. Allow TCP port 25 C. Allow TCP port 110 D. Allow UDP port 25 E. Allow UDP port 110 Correct Answer: BC
QUESTION 13 Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following? A. Project management B. Quality of service C. Configuration management D. Bandwidth shaping Correct Answer: C
The above content: shared N10-007 exam pdf, N10-007 Exam Questions And Answers, N10-007 exam video, and get the complete N10-007 exam dump path. For information about N10-007 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/n10-007.html (1148 Q&A)
New updated CompTIA CS0-002 exam questions from Lead4Pass CompTIA CS0-002 dumps! Welcome to download the latest Lead4Pass CompTIA CS0-002 dumps with PDF and VCE: https://www.leads4pass.com/cs0-002.html (260 Q&As)
Latest update CompTIA CS0-002 exam questions and answers online practice test
QUESTION 1 An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise environment One of the primary concerns is the exfiltration of data by malicious insiders, Which of the following controls is the MOST appropriate to mitigate risks? A. Data deduplication B. OS fingerprinting C. Digital watermarking D. Data loss prevention Correct Answer: D
QUESTION 2 A company\\’s modem response team is handling a threat that was identified on the network Security analysts have as at remote sites. Which of the following is the MOST appropriate next step in the incident response plan? A. Quarantine the webserver B. Deploy virtual firewalls C. Capture a forensic image of the memory and disk D. Enable webserver containerization Correct Answer: B
QUESTION 3 A security analyst, who is working for a company that utilizes Linux servers, receives the following results from a vulnerability scan:
Which of the following is MOST likely a false positive? A. ICMP timestamp request remote data disclosure B. Windows SMB service enumeration via \srvsvc C. Anonymous FTP enabled D. Unsupported web server detection Correct Answer: B
QUESTION 4 An analyst performs a routine scan of a host using Nmap and receives the following output:
Which of the following should the analyst investigate FIRST? A. Port 21 B. Port 22 C. Port 23 D. Port 80 Correct Answer: C
QUESTION 5 A Chief Information Security Officer (CISO) is concerned the development team, which consists of contractors, has too much access to customer data Developers use personal workstations, giving the company little to no visibility into the development activities. Which of the following would be BEST to implement to alleviate the CISO\\’s concern? A. DLP B. Encryption C. Test data D. NDA Correct Answer: D
QUESTION 6 A security analyst received an alert from the SIEM indicating numerous login attempts from users outside their usual geographic zones, all of which were initiated through the web-based mail server. The logs indicate all domain accounts experienced two login attempts during the same time frame. Which of the following is the MOST likely cause of this issue? A. A password-spraying attack was performed against the organization. B. A DDoS attack was performed against the organization. C. This was normal shift work activity; the SIEM\\’s AI is learning. D. A credentialed external vulnerability scan was performed. Correct Answer: A Reference: https://doubleoctopus.com/security-wiki/threats-and-tools/password-spraying/
QUESTION 7 Which of the following attacks can be prevented by using output encoding? A. Server-side request forgery B. Cross-site scripting C. SQL injection D. Command injection E. Cross-site request forgery F. Directory traversal Correct Answer: B
QUESTION 8 A small electronics company decides to use a contractor to assist with the development of a new FPGA- based device. Several of the development phases will occur off-site at the contractor\\’s labs. Which of the following is the main concern a security analyst should have with this arrangement? A. Making multiple trips between development sites increases the chance of physical damage to the FPGAs. Latest CS0-002 Dumps | CS0-002 PDF Dumps | CS0-002 VCE Dumps 4 / 7 https://www.leads4pass.com/CS0-002.html 2021 Latest lead4pass CS0-002 PDF and VCE dumps Download B. Moving the FPGAs between development sites will lessen the time that is available for security testing. C. Development phases occurring at multiple sites may produce change management issues. D. FPGA applications are easily cloned, increasing the possibility of intellectual property theft. Correct Answer: B Reference: https://www.eetimes.com/how-to-protect-intellectual-property-in-fpgas-devices-part-1/#
QUESTION 9 Employees of a large financial company are continuously being Infected by strands of malware that are not detected by EDR tools. When of the following Is the BEST security control to implement to reduce corporate risk while allowing employees to exchange files at client sites? A. MFA on the workstations B. Additional host firewall rules C. VDI environment D. Hard drive encryption E. Network access control F. Network segmentation Correct Answer: B
QUESTION 10 Which of the following technologies can be used to house the entropy keys for task encryption on desktops and laptops? A. Self-encrypting drive B. Bus encryption C. TPM D. HSM Correct Answer: A
QUESTION 11 An organization needs to limit its exposure to accidental disclosure when employees send emails that contain personal information to recipients outside the company Which of the following technical controls would BEST accomplish this goal? A. DLP B. Encryption C. Data masking D. SPF Correct Answer: A
QUESTION 12 A security analyst suspects a malware infection was caused by a user who downloaded malware after clicking http:///a.php is a phishing email. To prevent other computers from being infected by the same malware variation, the analyst should create a rule on the __________. A. email server that automatically deletes attached executables. B. IDS to match the malware sample. C. proxy to block all connections to. D. firewall to block connection attempts to dynamic DNS hosts. Correct Answer: C
QUESTION 13 As part of a review of incident response plans, which of the following is MOST important for an organization to understand when establishing the breach notification period? A. Organizational policies B. Vendor requirements and contracts C. Service-level agreements D. Legal requirements Correct Answer: D
The above content: shared CS0-002 exam pdf, CS0-002 Exam Questions And Answers, CS0-002 exam video, and get the complete CS0-002 exam dump path. For information about CS0-002 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/cs0-002.html (260 Q&A)
New updated CompTIA 220-1002 exam questions from Lead4Pass CompTIA 220-1002 dumps! Welcome to download the latest Lead4Pass CompTIA 220-1002 dumps with PDF and VCE: https://www.leads4pass.com/220-1002.html (631 Q&As)
Latest update CompTIA 220-1002 exam questions and answers online practice test
QUESTION 1 A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.) A. Remove any proxy servers configured on the user\\’s browsers. B. Assist the user with purchasing an SSL certificate and save the certificate to the desktop. C. Disable the SPI firewall on the office\\’s gateway and any other routers. D. Instruct the user to ignore the certificate error since the user is connecting to a secure website. E. Create an outbound rule in Windows Firewall named after the user\\’s homepage. F. Run anti-malware scans and download the latest Windows updates. Correct Answer: AF
QUESTION 2 Which of the following provide the BEST security for a server room? (Select two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades Correct Answer: AC
QUESTION 3 A technician is monitoring a network and notices an outage has occurred that could potentially cause a major disruption to the business workflow? Which of the following should the technician do NEXT? A. Identify the issue and its impact to the business B. Report the incident to the proper teams or management for awareness C. Start a root cause analysis and create documentation D. Create an action plan and implement the solution Correct Answer: A
QUESTION 4 A user calls the corporate help desk to report a malware detection message that is displayed on the user\\’s screen Which of the following should the technician instruct the user to do FIRST? A. Ignore the message as a false positive B. Shut down and restart the computer. C. Unplug the Ethernet cable. D. Follow the onscreen instructions to remove the malware Correct Answer: C
QUESTION 5 A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment? A. Client hardware requirements B. Server software security requirements C. Server hardware resources D. Network resources Correct Answer: C Reference: http://searchdatacenter.techtarget.com/guides/Using-hardware-resources-to-maximize-virtualizationperformance
QUESTION 6 A network support technician takes a call from an office manager who wants to change the wireless security key on the access point in that particular office. The office manager explains that a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect securely to the access point to make the change? A. RDP to 10.0.100.2 B. SSH to 10.0.100.2 C. HTTP to 10.0.100.2 D. Telnet to 10.0.100.2 Correct Answer: B
QUESTION 7 Which of the following is used for building entry and computer access? A. Smart card B. Personal identity verification card C. Hardware tokens D. Key fobs Correct Answer: D
QUESTION 8 Which of the following built-in accounts was removed in Windows 10? A. Power User B. Administrator C. Guest D. Standard User Correct Answer: A
QUESTION 9 An administrator is creating a new user account and wants to grant access to only the resources required to perform the user\\’s assigned job duties. Which of the following will the administrator MOST likely use? A. Access control lists B. Multifactor authentication C. Directory permissions D. Principle of least privilege Correct Answer: A
QUESTION 10 To which of the following should a technician ground an ESD strap when adding memory to a workstation? A. Computer chassis B. Surge protector C. Wooden workbench D. Power supply Correct Answer: A
QUESTION 11 Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for an inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue? A. See if Joe\\’s email address has been blacklisted B. Change the password on Joe\\’s email account C. Update the antivirus and perform a full scan on the PC D. Isolate Joe\\’s computer from the network Correct Answer: D
QUESTION 12 An end-user submits a request for the IT specialist to install new software on a workstation The workstation has the following specifications.
The minimum software requirements for the new application are dual-core. 64-bit OS with 4GB of RAM and 60GB storage Which of the following conditions will the technician encounter when attempting to install the software? A. Insufficient RAM B. Incompatible processor C. Insufficient storage D. Incompatible system architecture E. Insufficient network bandwidth Correct Answer: C
QUESTION 13 Which of the following would MOST likely contain troubleshooting guides? A. Acceptable use policy B. Topology diagram C. Knowledge base D. Incident documentation Correct Answer: C
Latest sharing of CompTIA exam discount codes
The latest CompTIA exam discount code for 2021. lead4pass is valid throughout the year. Select the purchased test questions and enter the discount code in the “Promotion Code:” input box to enjoy a 15% discount!
The above content: shared 220-1002 exam pdf, 220-1002 exam questions and answers, 220-1002 exam video, and get the complete 220-1002 exam dump path. For information about 220-1002 Dumps from Lead4pass (including: PDF and VCE), please visit: https://www.leads4pass.com/220-1002.html (631 Q&A)
New updated CompTIA 220-1001 exam questions from Lead4Pass CompTIA 220-1001 dumps! Welcome to download the latest Lead4Pass CompTIA 220-1001 dumps with PDF and VCE: https://www.leads4pass.com/220-1001.html (530 Q&As)
Latest update CompTIA 220-1001 exam questions and answers online practice test
QUESTION 1 A customer has two 8GB sticks of 2400-speed DDR4 installed in slots 1 and 2 of a computer and wants to add more RAM. The customer purchases two additional 4GB sticks of 3200-speed DDR4 and installs them in slots 3 and 4. While installing the RAM into the board, the user notices the board has a “quad channel” etched near the RAM slots. Which of the following can be said about the user\\’s channel configuration after upgrading the RAM? A. The computer is utilizing one channel. B. The computer is utilizing two channels. C. The computer is utilizing three channels. D. The computer is utilizing four channels. Correct Answer: D
QUESTION 2 A technician starts a recently built desktop PC for the first time, and the fan’s power on. However, the PC does not POST and nothing display on the monitor. Which of the following should the technician do NEXT to troubleshoot the issue? A. Check for OS error codes. B. Reseat the system memory. C. Replace the monitor. D. Replace the CMOS battery. Correct Answer: C
QUESTION 3 A business owner is concerned about excessive paper usage but is not concerned about the wear to the printer of the use of toner. The business owner asks a technician to find a low-cost solution. Which of the following is the BEST action for the technician to perform? A. Configure duplexing B. Enable collating C. Adjust the orientation D. Decrease the quality Correct Answer: A
QUESTION 4 A small company rents rack space in a colocation center, which was designed for high availability, for its servers that run critical business applications. This Is an example of a: A. private cloud. B. public cloud. C. hybrid cloud. D. community cloud. Correct Answer: A
QUESTION 5 A technician wants to set up a virtual machine in a public cloud environment. Which of the following cloud models should the technician use it? A. laaS B. SaaS C. PaaS D. DBaaS Correct Answer: A
QUESTION 6 Which of the following is considered a connectionless protocol? A. UDP B. TCP C. Telnet D. DNS Correct Answer: A
QUESTION 7 Which of the following is an IP address that is assigned to a network device based on its MAC address? A. Dynamic B. Static C. Link-local D. Reservation Correct Answer: D
QUESTION 8 A user is attempting to set up a new Bluetooth keyboard but is unable to pair the device. The user is able to see the device in the Bluetooth configuration tool. Which of the following is the MOST likely cause of the failure? A. Bluetooth is disabled. B. A PIN code is required. C. There is different Bluetooth versions. D. The device is not compatible. Correct Answer: B
QUESTION 9 A technician is installing virtualization software on the company developer\\’s desktop. The developer will need to run several VMs simultaneously. The system is loaded with the Windows 10 OS and has the following specifications: 1. i5 quad-core processor 2. 4GB of RAM 3. 256GB SSD Which of the following should the technician upgrade on the system FIRST to meet the developer\\’s requirements? A. SSD B. Processor C. RAM D. BIOS Correct Answer: C
QUESTION 10 A projector\\’s image begins to flicker during a presentation. The laptop display does not produce this issue. When a technician changes the resolution on the laptop, the issue persists. Which of the following is the NEXT step the technician should take? A. Check the connectivity of the VGA cable. B. Check the connectivity of the power cable. C. Change the aspect ratio on the laptop. D. Change the settings of the projector. Correct Answer: A
QUESTION 11 Which of the following devices is used to implement network security policies for an environment? A. Firewall B. managed switch C. Repeater D. Gateway Correct Answer: A
QUESTION 12 A workstation\\’s RAM is being upgraded to 24GB. The system has six RAM slots supporting DDR4 dual-channel, with a maximum of 32GB total system memory. Which of the following configurations will maximize system performance? A. Two 4GB DDR4 chips and one 16GB DDR4 chip B. Two 8GB DDR4 chips and one 8GB DDR4 chips C. Four 8GB DDR2 chips D. Six 4GB DDR4 chips Correct Answer: D
QUESTION 13 A technician installed a new printer for a client and successfully printed a test page. The next day, the customer reports there are garbled characters on printed pages. The technician questions the user and discovers OS updates were applied overnight. Which of the following should the technician check NEXT to troubleshoot the issue? A. If the device appears in the Device Manager B. If the correct printer driver is selected C. If the printer\\’s onboard memory is low D. If the Windows Print Spooler service is running Correct Answer: B
Latest sharing of CompTIA exam discount codes
The latest CompTIA exam discount code for 2021. lead4pass is valid throughout the year. Select the purchased test questions and enter the discount code in the “Promotion Code:” input box to enjoy a 15% discount!
The above content: shared 220-1001 exam pdf, 220-1001 exam questions, and answers, 220-1001 exam video, and get the complete 220-1001 exam dumps path. For information about 220-1001 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/220-1001.html (530 Q&A)
Successfully passing the CompTIA SY0-601 exam to obtain certification makes it easy for you to become a top talent.” CompTIA Security+ SY0-601 contains many latest technologies: monitor and protect hybrid environments, including cloud, mobile, and IoT; operate under the premise of understanding applicable laws and policies (including governance, risk and compliance principles); identify and analyze And respond to security incidents”
It is not a simple matter to obtain CompTIA Security+ SY0-601 certification: first, you need to pay the exam fee of 370 dollars, secondly, you need to learn a lot of professional knowledge for the exam, and finally, you need to take the exam. This kind of process does not guarantee that you will pass the exam. Every year, many people cannot pass the exam smoothly!
I’m not trying to discourage everyone’s confidence, I just say that the CompTIA Security+ SY0-601 exam is not easy! So I share 13 valid CompTIA SY0-601 exam questions for free to help you improve your skills and exam experience! All the exam questions I shared are the latest updates! All SY0-601 exam dumps come from Lead4pass.com! Lead4pass will help you save a lot of money and help you pass the exam successfully for the first time! And we have the best exam credibility! You are not the first to need us!
CompTIA Security+ SY0-601 exam practice question and answer online practice exam from Lead4pass
QUESTION 1 A Chief Executive Officer\\’s (CEO) personal information was stolen in a social engineering attack. Which of the following sources would reveal if the CEO\\’s personal information is for sale? A. Automated information sharing B. Open-source intelligence C. The dark web D. Vulnerability databases Correct Answer: C
QUESTION 2 A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for a particular string Which of the following would be BEST to use to accomplish the task? (Select TWO). A. head B. Tcpdump C. grep D. rail E. curl F. openssi G. dd Correct Answer: AB
QUESTION 3 A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money than it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership? A. MTBF B. RPO C. RTO D. MTTR Correct Answer: C
QUESTION 4 Drag the items on the left to show the different types of security for the shown devices. Not all fields need to be filled. Not all items need to be used. Select and Place:
Correct Answer:
For mobile devices, at bare minimum, you should have the following security measures in place: Screen lock, Strong password, Device encryption, Remote wipe/Sanitation, voice encryption, GPS tracking, Application control, Storage segmentation, Asset tracking as well as Device Access control. For servers in a data center your security should include: Fire extinguishers such as FM200 as part of fire suppression; Biometric, proximity badges, mantraps, HVAC, cable locks; these can all be physical security measures to control access to the server. References: Dulaney, Emmett and Chuck Easton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis, 2014, p. 418
QUESTION 5 A user contacts the help desk to report the following: Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID. This had never happened before, but the user entered the information as requested. The user was able to access the Internet but had trouble accessing the department share until the next day. The user is now getting notifications from the bank about unauthorized transactions. Which of the following attack vectors was MOST likely used in this scenario? A. Rogue access point B. Evil twin C. DNS poisoning D. ARP poisoning Correct Answer: A
QUESTION 6 A network administrator has been asked to design a solution to improve a company\\’s security posture The administrator is given the following, requirements? 1. The solution must be inline in the network 2. The solution must be able to block known malicious traffic 3. The solution must be able to stop network-based attacks Which of the following should the network administrator implement to BEST meet these requirements? A. HIDS B. NIDS C. HIPS D. NIPS Correct Answer: D
QUESTION 7 A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach? A. The most common set of MDM configurations will become the effective set of enterprise mobile security controls. B. All devices will need to support SCEP-based enrollment; therefore, the heterogeneity of the chosen architecture may unnecessarily expose private keys to adversaries. C. Certain devices are inherently less secure than others, so compensatory controls will be needed to address the delta between device vendors. D. MDMs typically will not support heterogeneous deployment environments, so multiple MDMs will need to be installed and configured. Correct Answer: C
QUESTION 8 During an incident response, a security analyst observes the following log entry on the webserver:
Which of the following BEST describes the type of attack the analyst is experiencing? A. SQL injection B. Cross-site scripting C. Pass-the-hash D. Directory traversal Correct Answer: B
QUESTION 9 An incident response technician collected a mobile device during an investigation. Which of the following should the technician do maintain chain of custody? A. Document the collection and require a sign-off when possession changes. B. Lock the device in a safe or other secure location to prevent theft or alteration. C. Place the device in a Faraday cage to prevent corruption of the data. D. Record the collection in a blockchain-protected public ledger. Correct Answer: A
QUESTION 10 Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident? A. MOU B. MTTR C. SLA D. NDA Correct Answer: C
QUESTION 11 A retail executive recently accepted a job with a major competitor. The following week, a security analyst reviews the security logs and identifies successful login attempts to access the departed executive\\’s accounts. Which of the following security practices would have addressed the issue? A. A non-disclosure agreement B. Least privilege C. An acceptable use policy D. Ofboarding Correct Answer: D
QUESTION 12 Which of the following control sets should a well-written BCP include? (Select THREE) A. Preventive B. Detective C. Deterrent D. Corrective E. Compensating F. Physical G. Recovery Correct Answer: ADG
QUESTION 13 An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria? A. TLS B. PFS C. ESP D. AH Correct Answer: A
Get the latest and complete CompTIA Security+ SY0-601 exam dumps! Help you pass the first exam successfully! Click here for more…
You have read my entire article, and I have already told you how to successfully pass the CompTIA Security+ SY0-601 exam. You can choose: https://www.leads4pass.com/sy0-601.html and go directly to SY0-601 Exam dumps channel! Get your key to successfully pass the exam! Wish you be happy!
Successfully passing the CompTIA SK0-004 exam to obtain certification makes it easy for you to become a top talent.” CompTIA Server + SK0-004 contains many latest technologies: server architecture, management, storage, security, network, troubleshooting, and disaster recovery”
It is not a simple matter to obtain CompTIA Server+ SK0-004 certification: first, you need to pay the exam fee of 338 dollars, secondly, you need to learn a lot of professional knowledge for the exam, and finally, you need to take the exam. This kind of process does not guarantee that you will pass the exam. Every year, many people cannot pass the exam smoothly!
I’m not trying to discourage everyone’s confidence, I just say that the CompTIA Server+ SK0-004 exam is not easy! So I share 13 valid CompTIA SK0-004 exam questions for free to help you improve your skills and exam experience! All the exam questions I shared are the latest updates! All SK0-004 exam dumps come from Lead4pass.com! Lead4pass will help you save a lot of money and help you pass the exam successfully for the first time! And we have the best exam credibility! You are not the first to need us!
CompTIA Server+ SK0-004 exam practice question and answer online practice exam from Lead4pass
QUESTION 1 Which of the following factors would cause a technician to select a hard drive over an SSD as a primary storage medium? A. Speed B. Power consumption C. Form factor D. Cost Correct Answer: D
QUESTION 2 During a lunch-and-learn session, IT staff and members participate in virtualization trivia. Which of the following are valid answers about hosts, guests, virtual NICs, and virtual switches? (Select TWO). A. A host contains virtual switches and virtual NICs. B. A guest contains one or more virtual NICs. C. A hypervisor is installed on a guest. D. A hypervisor is installed on a host. E. A guest contains one or more physical NICs. Correct Answer: BD
QUESTION 3 Employees working for a company were harmed by toxic fumes during a fire. To prevent this from reoccurring, which of the following cable types are SAFEST to use? A. CAT6 cables B. Plenum cables C. Fiber cables D. Coaxial cables Correct Answer: B
QUESTION 4 A system administrator needs to directly control a server that has no network connectivity. Which of the following should be used to accomplish this? A. SSH B. KVM C. RDP D. iLO/iDRAC Correct Answer: B
QUESTION 5 A technician wants to send a secure message to a user. The technician receives the public encryption keys from the user. Which of the following actions would be a prudent response? A. Notify the security team B. Send the user an encrypted message C. Revoke the compromised keys D. Add the encryption keys to the CRL Correct Answer: B
QUESTION 6 A technician is connecting a new server to a Fibre Channel SAN. Which of the following needs to be added to the server? A. HBA card B. 1GB Ethernet card C. SAS controller D. RAID controller Correct Answer: A
QUESTION 7 After installing a second processor and corresponding heatsink into a server, an administrator notices that the new processor is not showing up during POST. Which of the following could be the cause of this issue? A. The power supply is not sufficient to power the server. B. The voltage regulator module (VRM) was not installed. C. The IRQ setting was not set. D. The DMA setting was not set. Correct Answer: B
QUESTION 8 A technician is upgrading the memory in a server. The server requires DDR3 Registered DIMMs. The server has four banks of three slots for memory and currently, there is one 2GB module in each bank. When the technician attempts to add eight more 4GB modules of DDR3 unbuffered ECC memory, the memory does not fit in the slots. Which of the following is the cause of this issue? A. In a bank, 2GB and 4GB memory cannot be mixed. B. The server cannot use ECC memory. C. The server requires fully buffered memory. D. The total memory on the server cannot exceed 24GB of RAM. Correct Answer: C
QUESTION 9 An administrator is attempting an OS upgrade on a VM disk that is stored on a SAN. In the event of a failure, the administrator wants to ensure the system can return to a working state in the shortest amount of time possible. Which of the following backup methods would BEST accomplish this? A. A storage-level snapshot made on the SAN B. A full file-system backup stored on the SAN C. A full file-system backup stored on an LTO tape D. A system recovery point made with the OS E. A bit-level image stored on an SSD in the VM host Correct Answer: B
QUESTION 10 A technician is asked to install three servers: a 1U, a 4U, and a 6U. Which of the following is the MOST correct order to install these servers starting from the top of the rack? A. 1U, 4U, 6U B. 4U, 1U, 6U C. 4U, 6U, 1U D. 6U, 4U, 1U Correct Answer: A
QUESTION 11 A server administrator is notified that all three hard disks in a server array have failed. Which of the following is the MOST likely cause? A. Incompatible BIOS B. Backplane failure C. Cache battery failure D. Incorrect firmware version Correct Answer: B
QUESTION 12 A technician installs a rack in a data center. The rack has two power strips installed in it. To ensure maximum power redundancy for the rack, how should each PDU power strip be connected? A. Each to the same floor PDU B. Each to different floor PDUs C. Each to the same data center UPS D. Each to a different data center UPS Correct Answer: D
QUESTION 13 A manager notices the administrators spend a lot of time running power cords and network cables when installing new servers. The manager wants to reduce the amount of time administrators spend doing the power and network cabling. Which of the following will best allow staff to reduce that time? A. Mainframe B. Tower C. 2U rackmount server D. Blade server Correct Answer: D
Get the latest and complete CompTIA Server+ SK0-004 exam dumps! Help you pass the first exam successfully! Click here for more…
You have read my entire article, and I have already told you how to successfully pass the CompTIA Server+ SK0-004 exam. You can choose: https://www.leads4pass.com/sk0-004.html and go directly to SK0-004 Exam dumps channel! Get your key to successfully pass the exam! Wish you be happy!
Successfully passing the CompTIA 220-1002 exam to obtain certification makes it easy for you to become a top talent.
“CompTIA A + 220-1001 contains a lot of the latest technology: mobile devices, network technology, hardware, virtualization and cloud computing and network troubleshooting, and covers the installation and configuration of the operating system, extended security, software troubleshooting, and Operation process.”
It is not a simple matter to obtain CompTIA A+ 220-1002 certification: first, you need to pay the exam fee of 232 dollars, secondly, you need to learn a lot of professional knowledge for the exam, and finally, you need to take the exam. This kind of process does not guarantee that you will pass the exam. Every year, many people cannot pass the exam smoothly!
I’m not trying to discourage everyone’s confidence, I just say that the CompTIA A+ 220-1002 exam is not easy! So I share 13 valid CompTIA 220-1002 exam questions for free to help you improve your skills and exam experience! All the exam questions I shared are the latest updates! All 220-1002 exam dumps come from Lead4pass.com! Lead4pass will help you save a lot of money and help you pass the exam successfully for the first time! And we have the best exam credibility! You are not the first to need us!
CompTIA A+ 220-1002 exam practice question and answer online practice exam from Lead4pass
QUESTION 1 A technician would MOST likely use Windows PE on a Windows 7 system to perform which of the following functions? A. Install new programs outside of the OS B. Fix file system issues outside of the OS C. Print specialized reports of processes starting at boot D. Install new hardware with appropriate drivers Correct Answer: B
QUESTION 2 The IT department must ensure previously used passwords cannot be reused when users change their passwords. Which of the following password policies should be enforced to meet this requirement? (Select TWO.) A. Password complexity B. Password history C. Password length D. Maximum password age E. Minimum password age F. Lockout threshold Correct Answer: BE
QUESTION 3 An employee receives a phone call inquiring about company information. This is an example of which of the following? A. Phishing B. Social engineering C. Shoulder surfing D. Rootkits Correct Answer: B
QUESTION 4 A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO Correct Answer: BF
QUESTION 5 Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do? A. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot B. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time D. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved Correct Answer: C
QUESTION 6 A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.) A. Administrative share permissions B. Mapped drives C. Group Policy hours restriction D. Denied write/delete permissions E. Disabled proxy settings Correct Answer: BD
QUESTION 7 A small business, which is located in a Hood plain, wants a technician to recommend a backup strategy that will allow for Its flies to be recovered at an alternate location within a few days following a disaster. Which of the following backup methodologies will the technician MOST likely recommend\\’\\’ A. Implement a hoi site in an area outside the flood plain. B. Move all servers to a laaS provider and only use SaaS applications C. Install cloud backup software and use it (or regular backups D. Configure local tape backups and store them in a safe on-site. Correct Answer: C
QUESTION 8 A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning Correct Answer: C
QUESTION 9 A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with a yellow warning graphic. This icon advises the user that: A. BitLocker is operating on the system but not for the user B. BitLocker has locked the drive, and it is no longer accessible C. BitLocker is suspended, and the drive is no longer encrypted D. BitLocker has encountered an error and the user should run the check disk utility. Correct Answer: A
QUESTION 10 After rebooting, a technician sees the Windows logo but when Windows boots up, no video appears. Which of the following options would be the QUICKEST way to restore the computer? A. VGA Mode B. Last Known Good Configuration C. Safe Mode with Networking D. Safe Mode Correct Answer: B
QUESTION 11 A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside. Which of the following should the technician use to remove the excess dust and dirt? A. A brush B. A vacuum C. Compressed air D. A damp cloth Correct Answer: B
QUESTION 12 A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out. and will not display The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play Which of the following is MOST likely causing the Issue? A. Data transmission over the limit B. Unauthorized account access C. Resource overuse D. Unintended Bluetooth pairing Correct Answer: A
QUESTION 13 When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site? A. Certificates B. Software tokens C. Firewall D. Port security Correct Answer: A
Get the latest and complete CompTIA A+ 220-1002 exam dump! Help you pass the first exam successfully! Click here for more…
You have read my entire article, and I have already told you how to successfully pass the CompTIA A+ 220-1002 exam. You can choose: https://www.leads4pass.com/220-1002.html and go directly to 220-1002 Exam dump channel! Get your key to successfully pass the exam! Wish you be happy!
The latest updated CompTIA XK0-004 exam dumps and free XK0-004 exam practice questions and answers! Latest updates from Lead4Pass CompTIA XK0-004 Dumps PDF and XK0-004 Dumps VCE, Lead4Pass XK0-004 exam questions updated and answers corrected! Get the full CompTIA XK0-004 dumps from https://www.leads4pass.com/xk0-004.html (VCE&PDF)
The latest updated CompTIA XK0-004 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q13)
QUESTION 1 An administrator needs to create a shared directory in which all users are able, write, and execute its content but none of the regular users are able to delete any content. Which of the following permissions should be applied to this shared directory? A. rwxrwxrwt B. rwxrwxrws C. rwxrwxrwx D. rwxrwxrw* Correct Answer: C
QUESTION 2 A Linux administrator wants to obtain a list of files and subdirectories in the /etc directory that contain the word “services”. Once the files and subdirectories are discovered, they should be listed alphabetically in the /var/tmp/foundservices file. Which of the following shell scripts will accomplish this task? A. #/bin/bashfind /etc –name services | sort > /var/tmp/foundservices B. #/bin/bashlocate /etc –sort –name services > /var/tmp/foundservices C. #/bin/bashfind –name services –sort /var/tmp/foundservices Correct Answer: B
QUESTION 4 An administrator notices a directory on a web server named /var/www/html/old_reports that should no longer be accessible on the web. Which of the following commands will accomplish this task? A. chmod 000 /var/www/html/old_reports B. chgrp root /var/www/html/old_reports C. chown apache /var/www/html/old_reports D. setenforce apache /var/www/html/old_reports Correct Answer: D
QUESTION 5 A Linux administrator needs to switch from text mode to GUI. Which of the following run levels will start the GUI by default? A. Runlevel 3 B. Runlevel 4 C. Runlevel 5 D. Runlevel 6 Correct Answer: C Reference: http://www.linfo.org/runlevel_def.html
QUESTION 6 DRAG DROP The lead Linux has added a disk, /dev/sdd, to a VM that is running out of disk space. Place the following steps in the correct order from first (1) to last (4) to add the disk to the existing LVM. Select and Place:
Correct Answer:
QUESTION 7 A junior Linux administrator is installing a new application with CPU architecture requirements that have the following specifications: x64 bit 3.0GHz speed Minimum quad-core The administrator wants to leverage existing equipment but is unsure whether the requirements of these systems are adequate. The administrator issues the following command cat/proc/cpuinfo. The output of the command is as follows:
Which of the following is the recommended course of action the administrator should take based on this output? A. Install the application, as the system meets the application requirements B. Procure new equipment that matches the recommended specifications C. Recompile the Linux kernel to support the installation. D. Reconfigure lib modules to support the new application. Correct Answer: A
QUESTION 8 After starting a long-running script, a systems administrator needs to verify the frequency of what is filling up the /var partition and kill it because it is consuming too much space. Which of the following is the correct sequence given only a terminal is available?
A. 1. CTRL-C2. bg3. watch df /var4. CTRL-C5. fg6. CTRL-Z B. 1. CTRL-C2. fg3. watch df /var4. CTRL-Z5. bg6. CTRL-Z C. 1. CTRL-Z2. bg3. watch df /var4. CTRL-C5. fg6. CTRL-C D. 1. CTRL-Z2. bg3. watch df /var4. CTRL-Z5. fg6. CTRL-C Correct Answer: D
QUESTION 9 A Linux administrator needs to schedule a cron job to run at 1:15 p.m. every Friday to report the amount of free disk space on the system and to send the output to a file named “freespace”. Which of the following would meet this requirement? A. 13 15 * * 5 df > /freespace B. 15 13 * * 5 df > /freespace C. 15 1 * * 6 df > /freespace D. 15 13 6 * * df > /freespace Correct Answer: A
QUESTION 10 Joe, a member of the accounting group on a Linux system, is unable to write a file called “taxes” in the accounting shared directory. The ownership and permissions on the directory and file are as follows: accounting drwxrw-r– user = ann, group = accounting taxes -rw-r–r– , user = ann, group = accounting Which of the following commands would allow Joe to write to the file? (Choose two.) A. chmod g+x accounting B. chmod 777 taxes C. chgrp taxes accounting D. chgrp accounting taxes E. chmod 774 accounting F. chmod u+x accounting Correct Answer: AF Reference: https://www.pluralsight.com/blog/it-ops/linux-file-permissions
QUESTION 11 A junior Linux administrator needs to ensure service will start on system boot. Which of the following commands should be used to accomplish this task? A. chkconfig on B. systemctl bootup C. service enable D. crontab install Correct Answer: A Reference: https://geekflare.com/how-to-auto-start-services-on-boot-in-linux/
QUESTION 12 A systems administrator is enabling quotas on the /home directory of a Linux server. The administrator makes the appropriate edits to the /etc/fstab file and attempts to issue the commands to enable quotas on the desired directory. However, the administrator receives an error message stating the filesystem does not support quotas. Which of the following commands should the administrator perform to proceed? A. mount o remount /home B. quotacheck -cg C. edquota /home D. quotaon /home Correct Answer: D Reference: https://www.tecmint.com/set-filesystem-disk-quotas-on-ubuntu/
QUESTION 13 A networked has been crashing intermittently. A Linux administrator would like to write a shell script that will attempt to ping the server and email an alert if the server fails to respond. The script will later be scheduled via cron job. Which of the following scripts would BEST accomplish this task?
A. Option A B. Option B C. Option C D. Option D Correct Answer: D
Braindump4it shares the latest updated CompTIA XK0-004 exam exercise questions, XK0-004 dumps pdf for free. All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a portion of your exam questions for free to help you understand the exam content and enhance your exam experience! Get the full CompTIA XK0-004 exam dumps questions at: https://www.leads4pass.com/xk0-004.html (pdf&vce)
The latest updated CompTIA SY0-601 exam dumps and free SY0-601 exam practice questions and answers! Latest updates from Lead4Pass CompTIA SY0-601 Dumps PDF and SY0-601 Dumps VCE, Lead4Pass SY0-601 exam questions updated and answers corrected! Get the full CompTIA SY0-601 dumps from https://www.leads4pass.com/sy0-601.html (VCE&PDF)
The latest updated CompTIA SY0-601 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q13)
QUESTION 1 A security administrator suspects there may be unnecessary services running on a server. Which of the following tools will the administrator MOST likely use to confirm the suspicions? A. Nmap B. Wireshark C. Autopsy D. DNSEnum Correct Answer: A
QUESTION 2 HOTSPOT A newly purchased corporate WAP needs to be configured in the MOST secure manner possible. INSTRUCTIONS Please click on the below items on the network diagram and configure them accordingly: 1. WAP 2. DHCP Server 3. AAA Server 4. Wireless Controller 5. LDAP Server If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Hot Area:
Correct Answer:
Wireless Access Point: 1. Network Mode – G only 2. Wireless Channel – 11 3. Wireless SSID Broadcast – disable 4. Security settings – WPA2 Personal
QUESTION 3 A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the company, its facilities, its data, and its staff. Which of the following describes what the manager is doing? A. Developing an incident response plan B. Building a disaster recovery plan C. Conducting a tabletop exercise D. Running a simulation exercise Correct Answer: C
QUESTION 4 Which of the following cloud models provides clients with servers, storage, and networks but nothing else? A. SaaS B. PaaS C. IaaS D. DaaS Correct Answer: C
QUESTION 5 A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected. Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describes this type of attack? (Choose two.) A. DoS B. SSL stripping C. Memory leak D. Race condition E. Shimming F. Refactoring Correct Answer: AD
QUESTION 6 A company has drafted an Insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media? A. Monitoring large data transfer transactions in the firewall logs B. Developing mandatory training to educate employees about the removable media policy C. Implementing a group policy to block user access to system files D. Blocking removable-media devices and write capabilities using a host-based security tool Correct Answer: D
QUESTION 7 A security auditor is reviewing vulnerability scan data provided by an internal security team. Which of the following Does BEST indicate that valid credentials were used? A. The scan results show open ports, protocols, and services exposed on the target host B. The scan enumerated software versions of installed programs C. The scan produced a list of vulnerabilities on the target host D. The scan identified expired SSL certificates Correct Answer: B
QUESTION 8 A startup company is using multiple SaaS and laaS platforms to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms? A. SIEM B. DLP C. CASB D. SWG Correct Answer: C
QUESTION 9 For each of the given items, select the appropriate authentication category from the drop-down choices. Select the appropriate authentication type for the following items: Hot Area:
Correct Answer:
Biometrics refers to a collection of physical attributes of the human body that can be used as identification or an authentication factor. Fingerprints and retinas are physical attributes of the human body. Two types of tokens exist, Time-based one-time password (TOTP) tokens and HMACbased one-time password (HOTP). TOTP tokens generate passwords at fixed time intervals, whereas HOTP tokens generate passwords not based on fixed time intervals but instead based on a non-repeating one-way function, such as a hash or HMAC operation. Smart cards can have Multi-factor and proximity authentication embedded into them. PAP allows for two entities to share a password in advance and use the password as the basis of authentication. The same goes for PIN numbers. References: Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 282, 285 http://en.wikipedia.org/wiki/Password_authentication_protocol#Working_cycle http://en.wikipedia.org/wiki/Smart_card#Security
QUESTION 10 Users are attempting to access a company\\’s website but are transparently redirected to another website. The users confirm the URL is correct. Which of the following would BEST prevent this issue in the future? A. DNSSEC B. HTTPS C. IPSec D. TLS/SSL Correct Answer: A
QUESTION 11 Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident? A. MOU B. MTTR C. SLA D. NDA Correct Answer: C
QUESTION 12 A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection contains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users\\’ credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered? A. Password length, password encryption, password complexity B. Password complexity, least privilege, password reuse C. Password reuse, password complexity, password expiration D. Group policy, password history, password encryption Correct Answer: A
QUESTION 13 A development team employs the practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process? A. Continuous delivery B. Continuous integration C. Continuous validation D. Continuous monitoring Correct Answer: B
Braindump4it shares the latest updated CompTIA SY0-601 exam exercise questions, SY0-601 dumps pdf for free. All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a portion of your exam questions for free to help you understand the exam content and enhance your exam experience! Get the full CompTIA SY0-601 exam dumps questions at: https://www.leads4pass.com/sy0-601.html (pdf&vce)