CompTIA SY0-501 Security+ Take Ten Challenge #6Step 1 of 1010%6-1: A security administrator would like to minimize the number of backup tape sets used during a recovery exercise. Which of the following would be the BEST choice for this requirement? Full Differential RAID 0 Incremental Segmented 6-2:Which of the following would be the best use of SHA-2? Transfer private keys over a public network Securely store passwords in a centralized database Use the same key when encrypting and decrypting Confidentially transfer email messages over public networks Hide data inside of a graphics file 6-3: A SOHO router company has recently announced a security issue for one of their routers. Which of the following would BEST describe this vulnerability? Lack of vendor support Embedded system vulnerability Improper input handling End-of-life vulnerability Race condition 6-4: A security engineer would like to verify that an application is communicating using encrypted protocols. Which of the following would provide this verification? netstat traceroute Nmap dig tcpdump 6-5: A network architect needs to offload web server encryption to increase the speed of a public web application. Which of the following would BEST fit this requirement? Packet filter SSL accelerator DDoS mitigation Forward proxy VPN concentrator 6-6: A user has just signed for a delivery. What type of authentication was used? Something you have Something you are Something you know Something you do Somewhere you are 6-7: Fourteen laptops are expected to be stolen from an organization over the next twelve months. Which of the following would describe the total cost of these thefts? MFA ALE SLE AAA ARO 6-8: A VPN communication uses RSA to create and validate a digital signature. Which of the following would BEST describe this process? Block cipher Asymmetric encryption Hashing Key stretching Obfuscation 6-9: A financial company has installed a backup generator to protect against intentional power disruption. Which of the following security controls would BEST describe this installation? Deterrent Administrative Physical Compensating Preventive 6-10: A security administrator would like to increase the confidentiality of files stored on a local NAS. Which of these would be the BEST way to provide this function? HMAC AES SHA-2 BCRYPT RIPEMD