Which of the following commands should be used?
An auditor wants to test the security posture of an organization by running a tool that will display the following: Which of the following commands should be used? A. nbtstat B. nc C. arp D. ipconfig
Which of the following forms of authentication are being used?
A company is currently using the following configuration: • IAS server with certificate-based EAP-PEAP and MSCHAP • Unencrypted authentication via PAP A security administrator needs to configure a new wireless setup with the following configurations: • PAP authentication method • PEAP and EAP provide two-factor authentication Which of the following forms of authentication are being […]
Which of the following types of cloud infrastructures would allow several organizations with similar structure
Which of the following types of cloud infrastructures would allow several organizations with similar structures and interests to realize the benefits of shared storage and resources? A. Private B. Hybrid C. Public D. Community
Which of the following technical controls would help prevent these policy violations?
Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Choose two.) A. Password expiration B. Password length C. Password complexity D. Password history E. Password lockout
A security analyst is reviewing the following output from an IPS
A security analyst is reviewing the following output from an IPS: Given this output, which of the following can be concluded? (Choose two.) A. The source IP of the attack is coming from 250.19.18.22. B. The source IP of the attack is coming from 250.19.18.71. C. The attacker sent a malformed IGAP packet, triggering the […]
Which of the following types of keys is found in a key escrow?
Which of the following types of keys is found in a key escrow? A. Public B. Private C. Shared D. Session Explanation: https://www.professormesser.com/security-plus/sy0-401/key-escrow-3/
An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following ha
An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified? A. RTO B. RPO C. MTBF D. MTTR
Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the
Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network and security teams perform the following actions: • Shut down all network shares. • Run an email search identifying all employees who received the malicious message. • […]
Which of the following vulnerabilities would occur if this is executed?
Refer to the following code: Which of the following vulnerabilities would occur if this is executed? A. Page exception B. Pointer deference C. NullPointerException D. Missing null check
Which of the following explains why vendors publish MD5 values when they provide software patches for their cu
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet? A. The recipient can verify integrity of the software patch. B. The recipient can verify the authenticity of the site used to download the patch. C. The recipient can request future updates […]