CompTIA SY0-601 Security+ Take Ten Challenge #4Step 1 of 1010%4-1: Which of the following threat actors would be MOST motivated by profit? Hacktivist Organized crime Shadow IT Nation state 4-2: Which of the following would use rules to limit API communication? VPN TLS SSH NAT WAF 4-3: Which of the following allows the browser to check for certificate revocation? CSR OCSP CN CA TLS 4-4: Which of the following provides a knowledge base of adversary tactics and techniques? SSAE SOC 2 ISO 31000 EAP-TTLS MITRE ATT&CK framework Diamond model 4-5: Which security control would be MOST associated with a backup generator? Preventive Compensating Physical Detective Managerial 4-6: Which of the following would be the BEST way to randomize multiple hashes of the same data? VPN Salt FDE Key exchange SDN 4-7: Which of the following would determine which laws would apply to stored data? Data-at-rest Information Rights Management Diffusion Masking Sovereignty 4-8: Which of the following would be the MOST secure way of viewing traffic statistics from a router? RDP SNMPv3 FTPS SMB Telnet 4-9: A security administrator would like to restrict application use to a predefined set of apps. Which of the following would BEST describe this security type? DLP Quarantine Segmentation Deny list Approved list 4-10: A company has determined that laptops valued at $50,000 have been stolen over the last calendar year. Which of the following would describe this value? ARO ALE SLE Risk appetite Inherent risk