A small business office is setting up a wireless infrastructure with primary requirements centered around protecting customer information and preventing unauthorized access to the business network.
Which of the following would BEST support the office's business needs? (Select TWO)
A. Installing WAPs with strategic placement
B. Configuring access using WPAs
C. Installing a WIDS
D. Enabling MAC filtering
E. Changing the WiFi password every 30 days
F. Reducing WiFi transmit power throughout the office
Correct Answer: BD
Question 42:
An engineer is setting up a VDI environment for a factory location, and the business wants to deploy a low-cost solution to enable users on the shop floor to log in the VDI environment directly. Which of the following should the engineer select to meet these requirements?
A. Laptops
B. Containers
C. Thin clients
D. Workstations
Correct Answer: C
Thin clients make the VDI world go round. A thin client is a slimmed-down endpoint device that doesn't do any of the computing processing on the device itself; it relies on a network connection to the data center, where the virtual desktop is hosted.
The process of passively gathering information prior to launching a cyberattack is called:
A. tailgating.
B. reconnaissance.
C. pharming
D. prepending
Correct Answer: B
Question 44:
An organization has implemented a two-step verification process to protect user access to data that s stored in the coud Ic scssnncsitcibin a vdiemiietanebins code to access the data. Which of the following authentication methods did the organization implement?
A. Token key
B. B Static code
C. Push notification
D. HOTP
Correct Answer: A
A) TOKEN ,WRONG because it is a devise with 7 digit of temp pswd B) Static code= Wrong , it is a software testing issue before deploying into production C) Push Notification= Wong because we think of push notification like when an uber driver came to pick us for a ride, the app send push notification message saying your ride is ready. other forms of push notification include the battery percentage on your phone, the time, antenna signal, bluetooth all of them found in the upper left corner of your phone. These push notification just tell us information about our device if you see a low battery sign, you have to charge your battery. That all about push notification it is not an authentication protocol
D) HOTP THIS IS THE CORRECT ANSWER BECAUSE: there are two types of otp( hotp and totp) what is OTP? is is a one time password sent via the users mobile phone or email account for instance when you loose your face book password you will try to reset the password, so to confirm your identity facebook send TOTP via your mobile phone or email account did you get that?
Question 45:
A security administrator is trying to determine whether a server is vulnerable to a range of attacks. After using a tool, the administrator obtains the following output:
Which of the following attacks was successfully implemented based on the output?
A. Memory leak
B. Race conditions
C. SQL injection
D. Directory traversal
Correct Answer: D
A - Memory Leak - If there was a memory leak, the first line of the HTTP header probably wouldn't be HTTP/1.0 200 OK because it'd likely result in the server crashing. It is possible to have an ongoing memory leak without crashing the
server, but there is no evidence of that.
B - Race conditions - There is no evidence of race conditions.
C - SQL injection - There is no evidence of SQL injection.
D - Directory Traversal - This picture shows the output of an HTTP response, including both a header (first three lines) and a body. An HTTP response should not contain a body, especially one consisting of the contents of the passwd file. So
the HTTP request was probably something like "example.com/../../../../../../../etc/passwd".
Question 46:
Which of the following is a cryptographic concept that operates on a fixed length of bits?
A. Block cipher
B. Hashing
C. Key stretching
D. Salting
Correct Answer: A
Single-key or symmetric-key encryption algorithms create a fixed length of bits known as a block cipher with a secret key that the creator/sender uses to encipher data (encryption) and the receiver uses to decipher it.
Question 47:
Given the following snippet of Python code:
Which of the following types of malware MOST likely contains this snippet?
A. Logic bomb
B. Keylogger
C. Backdoor
D. Ransomware
Correct Answer: B
Question 48:
A security architect is designing the new outbound internet for a small company. The company would like all 50 users to share the same single Internet connection. In addition, users will not be permitted to use social media sites or external email services while at work.
Which of the following should be included in this design to satisfy these requirements? (Select TWO).
A. DLP
B. MAC filtering
C. NAT
D. VPN
E. Content filler
F. WAF
Correct Answer: CD
NAT (Network Address Translation) is a technology that allows multiple devices to share a single IP address, allowing them to access the internet while still maintaining security and privacy. VPN (Virtual Private Network) is a technology that creates a secure, encrypted tunnel between two or more devices, allowing users to access the internet and other network resources securely and privately. Additionally, VPNs can also be used to restrict access to certain websites and services, such as social media sites and external email services.
Question 49:
The compliance team requires an annual recertification of privileged and non-privileged user access. However, multiple users who left the company six months ago still have access. Which of the following would have prevented this compliance violation?
A. Account audits
B. AUP
C. Password reuse
D. SSO
Correct Answer: A
Account audits are periodic reviews of user accounts to ensure that they are being used appropriately and that access is being granted and revoked in accordance with the organization's policies and procedures. If the compliance team had been conducting regular account audits, they would have identified the users who left the company six months ago and ensured that their access was revoked in a timely manner. This would have prevented the compliance violation caused by these users still having access to the company's systems.
To prevent this compliance violation, the company should implement account audits. An account audit is a regular review of all user accounts to ensure that they are being used properly and that they are in compliance with the company's security policies. By conducting regular account audits, the company can identify inactive or unused accounts and remove access for those users. This will help to prevent compliance violations and ensure that only authorized users have access to the company's systems and data.
Question 50:
The management team has requested that the security team implement 802.1X into the existing wireless network setup. The following requirements must be met:
Minimal interruption to the end user Mutual certificate validation
Which of the following authentication protocols would meet these requirements?
A. EAP-FAST
B. PSK
C. EAP-TTLS
D. EAP-TLS
Correct Answer: D
EAP-TLS (Extensible Authentication Protocol - Transport Layer Security) is an authentication protocol that uses certificates to provide mutual authentication between the client and the authentication server. It also allows for the encryption of user credentials, making EAP-TLS a secure and reliable authentication protocol. According to the CompTIA Security+ SY0-601 Official Text Book, EAP-TLS is well- suited for wireless networks due to its mutual authentication capabilities and its ability to securely store credentials. It is also the preferred authentication protocol for 802.1X wireless networks.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.