1.
Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption?
2.
Which of the following best practices makes a wireless network more difficult to find?
3.
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?
4.
The use of social networking sites introduces the risk of:
5.
Which of the following is MOST likely to result in data loss?
6.
Sara, a security administrator, sends an email to the user to verify their password has been reset. Which of the following threats is BEST mitigated by this action?
7.
"First Test, First Pass" - www.lead2pass.com 8 CompTIA SY0-301 Exam Which of the following describes an LDAP injection attack?
8.
Which of the following concepts defines the requirement for data availability?
9.
Which of the following is an example of multifactor authentication?
10.
Which of the following is an attack designed to steal cell phone data and contacts?