Free SY0-701 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 14 of 0
QUESTION 61

- (Exam Topic 2)
A financial institution would like to store its customer data in the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

  1. A. Asymmetric
  2. B. Symmetric
  3. C. Homomorphic
  4. D. Ephemeral

Correct Answer: C
Homomorphic encryption is a cryptographic technique that allows data to be stored, accessed and manipulated while encrypted. Homomorphic encryption enables computations to be performed on ciphertexts, generating an encrypted result that, when decrypted, matches the result of the operations as if they had been performed on the plaintext. Homomorphic encryption can prevent the cloud service provider from being able to decipher the data due to its sensitivity, as the data remains encrypted at all times. Homomorphic encryption is not concerned about computational overheads and slow speeds, as it trades off performance for security and privacy. References:
SY0-701 dumps exhibit https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/cryptography-concepts-2/
SY0-701 dumps exhibithttps://www.professormesser.com/security-plus/sy0-601/sy0-601-video/symmetric-and-asymmetric-crypt

QUESTION 62

- (Exam Topic 2)
Which of Ihe following control types is patch management classified under?

  1. A. Deterrent
  2. B. Physical
  3. C. Corrective
  4. D. Detective

Correct Answer: C
Patch management is classified as a corrective control because it is used to correct vulnerabilities or weaknesses in systems and applications after they have been identified. It is a reactive approach that aims to fix problems that have already occurred rather than prevent them from happening in the first place.
Reference: CompTIA Security+ SY0-601 Official Textbook, page 109.

QUESTION 63

- (Exam Topic 1)
A security analyst was deploying a new website and found a connection attempting to authenticate on the site's portal. While Investigating The incident, the analyst identified the following Input in the username field:
SY0-701 dumps exhibit
Which of the following BEST explains this type of attack?

  1. A. DLL injection to hijack administrator services
  2. B. SQLi on the field to bypass authentication
  3. C. Execution of a stored XSS on the website
  4. D. Code to execute a race condition on the server

Correct Answer: B
The input "admin' or 1=1--" in the username field is an example of SQL injection (SQLi) attack. In this case, the attacker is attempting to bypass authentication by injecting SQL code into the username field that will cause the authentication check to always return true. References: CompTIA Security+ SY0-601 Exam Objectives: 3.1 Given a scenario, use appropriate software tools to assess the security posture of an organization.

QUESTION 64

- (Exam Topic 2)
Server administrators want to configure a cloud solution so that computing memory and processor usage are maximized most efficiently across a number of virtual servers. They also need to avoid potential
denial-of-service situations caused by availability. Which of the following should administrators configure to maximize system availability while efficiently utilizing available computing power?

  1. A. Dynamic resource allocation
  2. B. High availability
  3. C. Segmentation
  4. D. Container security

Correct Answer: A
Dynamic resource allocation is a technique that allows cloud providers to adjust the amount and distribution of computing resources according to the changing demand and capacity of the cloud environment1. Dynamic resource allocation can improve the efficiency and utilization of available computing power, as well as reduce the cost and energy consumption of the cloud infrastructure1. Dynamic resource allocation can also enhance the system availability and reliability by avoiding potential denial-of-service situations caused by overloading or under-provisioning of resources1.

QUESTION 65

- (Exam Topic 2)
A security analyst is investigating what appears to be unauthorized access to a corporate web application. The security analyst reviews the web server logs and finds the following entries:
SY0-701 dumps exhibit
Which of the following password attacks is taking place?

  1. A. Dictionary
  2. B. Brute-force
  3. C. Rainbow table
  4. D. Spraying

Correct Answer: D
Spraying is a password attack that involves trying a few common passwords against a large number of usernames. Spraying is different from brute-force attacks, which try many possible passwords against one username, or dictionary attacks, which try a list of words from a dictionary file against one username. Spraying is often used when the web application has a lockout policy that prevents multiple failed login attempts for the same username. Spraying can be detected by looking for patterns of failed login attempts from the same source IP address with different usernames and the same or similar passwords.

Page 14 of 0

Post your Comments and Discuss CompTIA SY0-701 exam with other Community members: