CompTIA SY0-501 Security+ Take Ten Challenge #4Step 1 of 1010%4-1: A malicious application has circumvented your wireless access point and is communicating directly between devices. Which of the following would BEST describe this technique? NAT VLAN Static routing Ad hoc Virtualization 4-2: A security administrator would like to authenticate users connecting to a VPN tunnel. This authentication should occur over a secure channel. Which of these would be the BEST choice for this requirement? LDAPS PAP HTTP ACL S/MIME 4-3: What type of backup makes a copy of all files that were changed since the last full backup? Incremental Real-time Differential Offline Hybrid 4-4: Robert is sending a document to Alicia, and he'd like to make sure that the contents of the document aren't modified. Which of the following should Robert follow? Use Alicia's private key to digitally sign the document Use his public key to digitally sign the document Use Alicia's public key to digitally sign the document Use his private key and Alicia's public key to create a shared symmetric key Use his private key to digitally sign the document 4-5: Each time a user starts their browser, a pop-up window appears with a promotion for a local restaurant. Which of the following would best describe this scenario? Adware Logic bomb RAT Worm Keylogger 4-6: Which of the following could be used to obtain the banner of a service? traceroute dig netcat tcpdump netstat 4-7: A system administrator would like to limit account permissions to the minimum required for the user to complete their assigned tasks. Which of these would BEST describe this? Least functionality EAL FDE Application whitelisting TPM 4-8: When checking out laptops, employees must provide a signature. Which of the following would best describe this authentication factor? Something you do Something you have Somewhere you are Something you are Something you know 4-9: Which of the following would be considered a corrective security control? Security policy Backups Login banner Mantrap Motion detector 4-10: Which of the following would be the BEST way to randomize a stored password? Forward secrecy Diffusion Steganography Salt Nonce