CompTIA Security+ SY0-601 – Question020

A security manager has tasked the security operations center with locating all web servers that respond to an unsecure protocol. Which of the following commands could an analyst run to find the requested servers?


A.
nslookup 10.10.10.0
B. nmap -p 80 10.10.10.0/24
C. pathping 10.10.10.0 -p 80
D. ne -l -p 80

Correct Answer: B

CompTIA Security+ SY0-601 – Question019

Which of the following is a reason to publish files' hashes?


A.
To validate the integrity of the files
B. To verify if the software was digitally signed
C. To use the hash as a software activation key
D. To use the hash as a decryption passphrase

Correct Answer: A

CompTIA Security+ SY0-601 – Question018

A company recently experienced an inside attack using a corporate machine that resulted in data compromise.
Analysis indicated an unauthorized change to the software circumvented technological protection measures.
The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?


A.
HIPS
B. FIM
C. TPM
D. DLP

Correct Answer: C

CompTIA Security+ SY0-601 – Question017

A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen:
Please use a combination of numbers, special characters, and letters in the
password field.
Which of the following concepts does this message describe?


A.
Password complexity
B. Password reuse
C. Password history
D. Password age

Correct Answer: A

CompTIA Security+ SY0-601 – Question015

An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?


A.
Perform a mathematical operation on the passwords that will convert them into unique strings.
B. Add extra data to the passwords so their length is increased, making them harder to brute force.
C. Store all passwords in the system in a rainbow table that has a centralized location.
D. Enforce the use of one-time passwords that are changed for every login session.

Correct Answer: A

CompTIA Security+ SY0-601 – Question014

A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send the file to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?


A.
S/MIME
B. LDAPS
C. SSH
D. SRTP

Correct Answer: C

CompTIA Security+ SY0-601 – Question012

Several attempts have been made to pick the door lock of a secure facility. As a result, the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer's assignment?


A.
Replacing the traditional key with an RFID key
B. Installing and monitoring a camera facing the door
C. Setting motion-sensing lights to illuminate the door on activity
D. Surrounding the property with fencing and gates

Correct Answer: A