Use of performance analytics b adherence to

This preview shows page 59 - 64 out of 234 pages.

Use of performance analyticsB. Adherence to regulatory complianceC. Data retention policiesD. Size of the corporationE. CompTIA SY0-501 Exam"Everything is under control" - 59
Breadth of applications supportAnswer: B,CExplanation: QUESTION NO: 92 Which of the following occurs when the security of a web application relies on JavaScript for inputvalidation? A. The integrity of the data is at risk.B. The security of the application relies on antivirus. C. A host-based firewall is required.D. The application is vulnerable to race conditions.Answer: AExplanation: QUESTION NO: 93 An analyst is reviewing a simple program for potential security vulnerabilities before beingdeployed to a Windows server. Given the following code:Which of the following vulnerabilities is present? CompTIA SY0-501 Exam"Everything is under control" - 60
A. Bad memory pointerB. Buffer overflowC. Integer overflowD. BackdoorAnswer: BExplanation: QUESTION NO: 94 An organization's file server has been virtualized to reduce costs. Which of the following types ofbackups would be MOST appropriate for the particular file server? A. SnapshotB. FullC. IncrementalD. DifferentialAnswer: CExplanation: QUESTION NO: 95 A wireless network uses a RADIUS server that is connected to an authenticator, which in turnconnects to a supplicant. Which of the following represents the authentication architecture in use? CompTIA SY0-501 Exam"Everything is under control" - 61
A. Open systems authenticationB. Captive portalC. RADIUS federationD. 802.1xAnswer: DExplanation: QUESTION NO: 96 An employer requires that employees use a key-generating app on their smartphones to log intocorporate applications. In terms of authentication of an individual, this type of access policy isBEST defined as: A. Something you have.B. Something you know.C. Something you do.D. Something you are.Answer: AExplanation: QUESTION NO: 97 Adhering to a layered security approach, a controlled access facility employs security guards whoverify the authorization of all personnel entering the facility. Which of the following terms BESTCompTIA SY0-501 Exam"Everything is under control" - 62
describes the security control being employed? A. Administrative B. CorrectiveC. DeterrentD. CompensatingAnswer: CExplanation: QUESTION NO: 98 A security analyst is hardening a web server, which should allow a secure certificate-basedsession using the organization’s PKI infrastructure. The web server should also utilize the latestsecurity techniques and standards. Given this set of requirements, which of the followingtechniques should the analyst implement to BEST meet these requirements? (Select two.)A. Install an X- 509-compliant certificate.B. Implement a CRL using an authorized CA.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture