Which of the following best describes the proper

This preview shows page 289 - 294 out of 459 pages.

Which of the following BEST describes the proper employment of multifactor authentication? CompTIA SY0-501 Exam "Pass Any Exam. Any Time." - 289
A. Proximity card, fingerprint scanner, PIN B. Fingerprint scanner, voice recognition, proximity card C. Smart card, user PKI certificate, privileged user certificate D. Voice recognition, smart card, proximity card Answer: A Explanation: QUESTION NO: 437 Upon entering an incorrect password, the logon screen displays a message informing the user that the password does not match the username provided and is not the required length of 12 characters. Which of the following secure coding techniques should a security analyst address with the application developers to follow security best practices? A. Input validation B. Error handling C. Obfuscation D. Data exposure Answer: B Explanation: CompTIA SY0-501 Exam "Pass Any Exam. Any Time." - 290
QUESTION NO: 438 Which of the following is the BEST reason to run an untested application is a sandbox? A. To allow the application to take full advantage of the host system's resources and storage B. To utilize the host systems antivirus and firewall applications instead of running it own protection C. To prevent the application from acquiring escalated privileges and accessing its host system D. To increase application processing speed so the host system can perform real-time logging Answer: C Explanation: QUESTION NO: 439 A security technician has been receiving alerts from several servers that indicate load balancers have had a significant increase in traffic. The technician initiates a system scan. The scan results illustrate that the disk space on several servers has reached capacity. The scan also indicates that incoming internet traffic to the servers has increased. Which of the following is the MOST likely cause of the decreased disk space? A. Misconfigured devices B. Logs and events anomalies C. Authentication issues D. Unauthorized software Answer: D Explanation: CompTIA SY0-501 Exam "Pass Any Exam. Any Time." - 291
QUESTION NO: 440 A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The main culprit of CPU utilization is the antivirus program. Which of the following issue could occur if left unresolved? (Select TWO) A. MITM attack B. DoS attack C. DLL injection D. Buffer overflow E. Resource exhaustion Answer: B,E Explanation: QUESTION NO: 441 Which of the following is used to validate the integrity of data? A. CBC B. Blowfish C. MD5 D. RSA CompTIA SY0-501 Exam "Pass Any Exam. Any Time." - 292
Answer: C Explanation: QUESTION NO: 442 A user typically works remotely over the holidays using a web-based VPN to access corporate resources. The user reports getting untrusted host errors and being unable to connect. Which of the following is MOST likely the cause?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture