A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?
A.Vulnerability scanning
B. Penetration testing
C. Application fuzzing
D. User permission auditing
Answer: A
Question No :02
Two users need to send each other emails over unsecured channels. The system should support the principle of
non-repudiation. Which of the following should be used to sign the user’s certificates?
A. RA
B. CA
C. CRL
D. CSR
Answer: B
Question No :03
Which of the following can be provided to an AAA system for the identification phase?
A.Username
B. Permissions
C. One-time token
D. Private certificate
Answer: A
Question No :04
Which of the following types of keys is found in a key escrow?
A. Public
B. Private
C. Shared
D. Session
Answer: B
Question No :05
A senior incident response manager receives a call about some external IPs communicating with internal
computers during off hours. Which of the following types of malware is MOST likely causing this issue?
A. Botnet
B. Ransomware
C. Polymorphic malware
D. Armored virus
Answer: A
1 comments:
I have met many students who have successfully certified in IT with the help of CompTIA SY0-601 Dumps. I also aced my certification with distinctive grades and I enjoyed my reading period. I liked the style of presentation. CompTIA SY0-601 questions and answers were amazingly well defined and informative. I strongly recommend all IT candidates to go for this dumps material. Get 30% discount as well by using SPL30 coupon code.
Post a Comment