Free SY0-701 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 20 of 0
QUESTION 91

- (Exam Topic 2)
A cybersecurity analyst at Company A is working to establish a secure communication channel with a counter part at Company B, which is 3,000 miles (4.828 kilometers) away. Which of the following concepts would help the analyst meet this goal m a secure manner?

  1. A. Digital signatures
  2. B. Key exchange
  3. C. Salting
  4. D. PPTP

Correct Answer: B
Key exchange Short
Key exchange is the process of securely sharing cryptographic keys between two parties over a public network. This allows them to establish a secure communication channel and encrypt their messages. There are different methods of key exchange, such as Diffie-Hellman or RSA. References: https://www.comptia.org/content/guides/what-is-encryption

QUESTION 92

- (Exam Topic 1)
A third party asked a user to share a public key for secure communication. Which of the following file formats should the user choose to share the key?

  1. A. .pfx
  2. B. .csr
  3. C. .pvk
  4. D. .cer

Correct Answer: D
A user should choose the .cer file format to share a public key for secure communication. A .cer file is a public key certificate that can be shared with third parties to enable secure communication.
References: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 6: Cryptography, pp. 301-302.
A public key is a cryptographic key that can be used to encrypt or verify data. A public key file is a file that contains one or more public keys in a specific format.
There are different formats for public key files, depending on the application and the algorithm used. Some of the common formats are:
SY0-701 dumps exhibit .pfx: This is a file format that stores a certificate and its private and public keys. It is also known as PKCS#12 or Personal Information Exchange. It is used by some applications such as Microsoft Internet Explorer and Outlook to import and export certificates and keys.1
SY0-701 dumps exhibit .csr: This is a file format that stores a Certificate Signing Request, which is a message sent to a Certificate Authority (CA) to request a digital certificate. It contains the public key and some information about the identity of the requester. It is also known as PKCS#10 or Certification Request Syntax.2
SY0-701 dumps exhibit .pvk: This is a file format that stores a private key for Microsoft Authenticode code signing. It is used with a .spc file that contains the certificate and public key.3
SY0-701 dumps exhibit .cer: This is a file format that stores a certificate, which is a document that binds a public key to an identity. It is also known as DER or Distinguished Encoding Rules. It is used by some applications such as OpenSSL and Java to read and write certificates.4

QUESTION 93

- (Exam Topic 2)
A security administrator Is evaluating remote access solutions for employees who are geographically dispersed. Which of the following would provide the MOST secure remote access? (Select TWO).

  1. A. IPSec
  2. B. SFTP
  3. C. SRTP
  4. D. LDAPS
  5. E. S/MIME
  6. F. SSL VPN

Correct Answer: AF
IPSec (Internet Protocol Security) is a technology that provides secure communication over the internet by encrypting traffic and authenticating it at both the sender and receiver. It can be used to create secure tunnels between two or more devices, allowing users to access resources securely and privately.
SSL VPN (Secure Sockets Layer Virtual Private Network) is a type of VPN that uses an SSL/TLS connection to encrypt traffic between two or more devices. It is a secure and reliable solution for providing remote access, as all traffic is encrypted and authenticated. Additionally, SSL VPNs can also be used to restrict access to certain websites and services, making them a secure and robust solution for remote access.

QUESTION 94

- (Exam Topic 2)
A security analyst is reviewing packet capture data from a compromised host On the In the packet capture. analyst locates packets that contain large of text, Which Of following is most likely installed on compromised host?

  1. A. Keylogger
  2. B. Spyware
  3. C. Torjan
  4. D. Ransomware

Correct Answer: A
A keylogger is a type of malware that records the keystrokes of the user and sends them to a remote attacker. The attacker can use the keystrokes to steal the user’s credentials, personal information, or other sensitive data. A keylogger can generate packets that contain large amounts of text, as the packet capture data shows.

QUESTION 95

- (Exam Topic 2)
A company recently enhanced mobile device configuration by implementing a set of security controls: biometrics, context-aware authentication, and full device encryption. Even with these settings in place, an unattended phone was used by a malicious actor to access corporate data.
Which of the following additional controls should be put in place first?

  1. A. GPS tagging
  2. B. Remote wipe
  3. C. Screen lock timer
  4. D. SEAndroid

Correct Answer: C
According to NIST Special Publication 1800-4B1, some of the security controls that can be used to protect mobile devices include:
SY0-701 dumps exhibit Root and jailbreak detection: ensures that the security architecture for a mobile device has not been compromised.
SY0-701 dumps exhibit Encryption: protects the data stored on the device and in transit from unauthorized access.
SY0-701 dumps exhibit Authentication: verifies the identity of the user and the device before granting access to enterprise resources.
SY0-701 dumps exhibit Remote wipe: allows the organization to erase the data on the device in case of loss or theft.
SY0-701 dumps exhibit Screen lock timer: sets a time limit for the device to lock itself after a period of inactivity.

Page 20 of 0

Post your Comments and Discuss CompTIA SY0-701 exam with other Community members: