Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 13 of 107
QUESTION 56

- (Exam Topic 4)
After installing a Windows server, a cybersecurity administrator needs to harden it, following security best practices. Which of the following will achieve the administrator's goal? (Select TWO).

  1. A. Disabling guest accounts
  2. B. Disabling service accounts
  3. C. Enabling network sharing
  4. D. Disabling NetBIOS over TCP/IP
  5. E. Storing LAN manager hash values
  6. F. Enabling NTLM

Correct Answer: AD

QUESTION 57

- (Exam Topic 3)
A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?

  1. A. Predictability
  2. B. Key stretching
  3. C. Salting
  4. D. Hashing

Correct Answer: C
https://www.techtarget.com/searchsecurity/definition/salt

QUESTION 58

- (Exam Topic 5)
A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the company to require from prospective vendors?

  1. A. IP restrictions
  2. B. Multifactor authentication
  3. C. A banned password list
  4. D. A complex password policy

Correct Answer: B

QUESTION 59

- (Exam Topic 3)
A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output:
SY0-601 dumps exhibit
Which of the following attacks does the analyst MOST likely see in this packet capture?

  1. A. Session replay
  2. B. Evil twin
  3. C. Bluejacking
  4. D. ARP poisoning

Correct Answer: B
https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack
One of the main purposes of deauthentication used in the hacking community is to force clients to connect to an evil twin access point which then can be used to capture network packets transferred between the client and the access point.

QUESTION 60

- (Exam Topic 4)
The process of passively gathering information prior to launching a cyberattack is called:

  1. A. tailgating.
  2. B. reconnaissance.
  3. C. pharming.
  4. D. prepending.

Correct Answer: B

Page 13 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: