Skip to content (Press Enter)

Microsoft Azure MCSD MCSE MCSA MCTS Exams Questions Online

  • Home
  • Online Microsoft Exams PDF Files
  • Online Cisco Exams PDF Files
  • Online CompTIA Exams PDF Files
  • Online VMware Exams PDF Files

[Free] 2018(Apr) EnsurePass Braindumps CompTIA SY0-401 Dumps with VCE and PDF 1041-1050

by adminupdated on April 27, 2018April 27, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Apr CompTIA Official New Released SY0-401
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification

Question No: 1041 – (Topic 6)

Which of the following cryptographic related browser settings allows an organization to communicate securely?

  1. SSL 3.0/TLS 1.0

  2. 3DES

  3. Trusted Sites

  4. HMAC

Answer: A Explanation:

Secure Sockets Layer (SSL) is used to establish a secure communication connection between two TCP-based machines. Transport Layer Security (TLS) is a security protocol that expands upon SSL. Many industry analysts predict that TLS will replace SSL in the future. TLS 1.0 was first defined in RFC 2246 in January 1999 as an upgrade of SSL Version 3.0. As of February 2015, the latest versions of all major web browsers support TLS 1.0, 1.1, and 1.2, have them enabled by default.

Question No: 1042 – (Topic 6)

Which of the following algorithms has well documented collisions? (Select TWO).

  1. AES

  2. MD5

  3. SHA

  4. SHA-256

  5. RSA

Answer: B,C Explanation:

B: MD5 biggest weakness is that it does not have strong collision resistance, and thus it is no longer recommended for use.

C: SHA-1 (also known as SHA) is being retired from most government uses; the U.S.

National Institute of Standards and Technology said, quot;Federal agencies should stop using SHA-1 for…applications that require collision resistance as soon as practical, and must use the SHA-2 family of hash functions for these applications after 2010quot;, though that was later relaxed.

Note: The hashing algorithm must have few or no collisions. This means that hashing two different inputs does not give the same output.

Cryptographic hash functions are usually designed to be collision resistant. But many hash functions that were once thought to be collision resistant were later broken. MD5 and SHA- 1 in particular both have published techniques more efficient than brute force for finding collisions.

Question No: 1043 – (Topic 6)

The public key is used to perform which of the following? (Select THREE).

  1. Validate the CRL

  2. Validate the identity of an email sender

  3. Encrypt messages

  4. Perform key recovery

  5. Decrypt messages

  6. Perform key escrow

Answer: B,C,E Explanation:

B: The sender uses the private key to create a digital signature. The message is, in effect, signed with the private key. The sender then sends the message to the receiver. The receiver uses the public key attached to the message to validate the digital signature. If the values match, the receiver knows the message is authentic.

C: The sender uses the public key to encrypt a message, and the receiver uses the private key to decrypt the message.

E: You encrypt data with the private key and decrypt with the public key, though the opposite is much more frequent.

Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic protocols based on algorithms that require two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked.

Question No: 1044 – (Topic 6)

Which of the following provides the HIGHEST level of confidentiality on a wireless network?

  1. Disabling SSID broadcast

  2. MAC filtering

  3. WPA2

  4. Packet switching

Answer: C Explanation:

The Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) authentication protocols were designed to address the core, easy-to-crack problems of WEP.

Question No: 1045 – (Topic 6)

Which of the following explains the difference between a public key and a private key?

  1. The public key is only used by the client while the private key is available to all. Both keys are mathematically related.

  2. The private key only decrypts the data while the public key only encrypts the data. Both keys are mathematically related.

  3. The private key is commonly used in symmetric key decryption while the public key is used in asymmetric key decryption.

  4. The private key is only used by the client and kept secret while the public key is available to all.

Answer: D Explanation:

The private key must be kept secret at all time. The private key is only by the client. The public key is available to anybody.

Question No: 1046 – (Topic 6)

Deploying a wildcard certificate is one strategy to:

  1. Secure the certificate’s private key.

  2. Increase the certificate’s encryption key length.

  3. Extend the renewal date of the certificate.

  4. Reduce the certificate management burden.

Answer: D Explanation:

A wildcard certificate is a public key certificate which can be used with multiple subdomains of a domain. This saves money and reduces the management burden of managing multiple certificates, one for each subdomain.

A single Wildcard certificate for *.example.com, will secure all these domains: payment.example.com

contact.example.com login-secure.example.com www.example.com

Because the wildcard only covers one level of subdomains (the asterisk doesn#39;t match full stops), these domains would not be valid for the certificate:

test.login.example.com

Question No: 1047 – (Topic 6)

Due to hardware limitation, a technician must implement a wireless encryption algorithm that uses the RC4 protocol. Which of the following is a wireless encryption solution that the technician should implement while ensuring the STRONGEST level of security?

A. WPA2-AES

B. 802.11ac

  1. WPA-TKIP

  2. WEP

Answer: C Explanation:

WPA-TKIP uses the RC4 cipher.

TKIP and the related WPA standard implement three new security features to address security problems encountered in WEP protected networks. First, TKIP implements a key mixing function that combines the secret root key with the initialization vector before

passing it to the RC4 initialization. WEP, in comparison, merely concatenated the initialization vector to the root key, and passed this value to the RC4 routine. This permitted the vast majority of the RC4 based WEP related key attacks. Second, WPA implements a sequence counter to protect against replay attacks. Packets received out of order will be rejected by the access point. Finally, TKIP implements a 64-bit Message Integrity Check (MIC)

To be able to run on legacy WEP hardware with minor upgrades, TKIP uses RC4 as its cipher. TKIP also provides a rekeying mechanism. TKIP ensures that every data packet is sent with a unique encryption key.

Question No: 1048 – (Topic 6)

Company employees are required to have workstation client certificates to access a bank website. These certificates were backed up as a precautionary step before the new computer upgrade. After the upgrade and restoration, users state they can access the bank’s website, but not login. Which is the following is MOST likely the issue?

  1. The IP addresses of the clients have change

  2. The client certificate passwords have expired on the server

  3. The certificates have not been installed on the workstations

  4. The certificates have been installed on the CA

Answer: C Explanation:

The computer certificates must be installed on the upgraded client computers.

Question No: 1049 – (Topic 6)

Which of the following would Matt, a security administrator, use to encrypt transmissions from an internal database to an internal server, keeping in mind that the encryption process must add as little latency to the process as possible?

  1. ECC

  2. RSA

  3. SHA

  4. 3DES

Answer: D Explanation:

3DES would be less secure compared to ECC, but 3DES would require less computational power.

Triple-DES (3DES) is a technological upgrade of DES. 3DES is still used, even though AES is the preferred choice for government applications. 3DES is considerably harder to break than many other systems, and it’s more secure than DES. It increases the key length to 168 bits (using three 56-bit DES keys).

Question No: 1050 – (Topic 6)

In which of the following scenarios is PKI LEAST hardened?

  1. The CRL is posted to a publicly accessible location.

  2. The recorded time offsets are developed with symmetric keys.

  3. A malicious CA certificate is loaded on all the clients.

  4. All public keys are accessed by an unauthorized user.

Answer: C Explanation:

A rogue Certification Authority (CA) certificate allows malicious users to impersonate any Web site on the Internet, including banking and e-commerce sites secured using the HTTPS protocol. A rogue CA certificate would be seen as trusted by Web browsers, and it is harmful because it can appear to be signed by one of the root CAs that browsers trust by default. A rogue Certification Authority (CA) certificate can be created using a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure Web sites.

100% Ensurepass Free Download!
–Download Free Demo:SY0-401 Demo PDF
100% Ensurepass Free Guaranteed!
–SY0-401 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

HOT CATEGORY!

Pass CISCO EXAM with EnsurePass
Pass CCNA EXAM with EnsurePass
Pass CCNP EXAM with EnsurePass
Pass Security Exam with EnsurePass
Pass MCSE EXAM with EnsurePass
Pass MSCA EXAM with EnsurePass

HOT EXAM!

Microsoft Dumps VCE PDF
Cisco Dumps VCE PDF
VMware Dumps VCE PDF
CompTIA Dumps VCE PDF

SY0-401 Latest Exam (Apr 2018)
CompTIA SY0-401 PDF CompTIA SY0-401 Practice Test CompTIA SY0-401 Testing software CompTIA SY0-401 VCE Latest CompTIA SY0-401 Dumps Latest CompTIA SY0-401 Real Exam Latest CompTIA SY0-401 Real Test New Updated SY0-401 Actual Tests
0

admin

Post Navigation

Previous Article
Next Article

Latest Microsoft Certifications Exams Dumps

Microsoft Azure Exams Dumps
Azure AI Engineer Associate Exams Dumps
Azure Data Engineer Associate Exams Dumps
Azure Security Engineer Associate Exams Dumps
Microsoft Azure Fundamentals Exams Dumps
MCSA Exams Dumps
MCSD Exams Dumps
MCSE Exams Dumps
MCTS Exams Dumps
MOS Exams Dumps
MTA Exams Dumps

Categories

Tags

CompTIA JK0-018 PDF CompTIA JK0-018 Practice Test CompTIA JK0-018 Testing software CompTIA JK0-018 VCE CompTIA JK0-022 PDF CompTIA JK0-022 Practice Test CompTIA JK0-022 Testing software CompTIA JK0-022 VCE CompTIA JK0-023 PDF CompTIA JK0-023 Practice Test CompTIA JK0-023 Testing software CompTIA JK0-023 VCE CompTIA SY0-401 PDF CompTIA SY0-401 Practice Test CompTIA SY0-401 Testing software CompTIA SY0-401 VCE Latest CompTIA JK0-018 Dumps Latest CompTIA JK0-018 Real Exam Latest CompTIA JK0-018 Real Test Latest CompTIA JK0-022 Dumps Latest CompTIA JK0-022 Real Exam Latest CompTIA JK0-022 Real Test Latest CompTIA JK0-023 Dumps Latest CompTIA JK0-023 Real Exam Latest CompTIA JK0-023 Real Test Latest CompTIA SY0-401 Dumps Latest CompTIA SY0-401 Real Exam Latest CompTIA SY0-401 Real Test Latest Oracle 1z0-053 Dumps Latest Oracle 1z0-053 Real Exam Latest Oracle 1z0-053 Real Test Latest VMware VCP-310 Dumps Latest VMware VCP-310 Real Exam New Updated 1z0-053 Actual Tests New Updated JK0-018 Actual Tests New Updated JK0-022 Actual Tests New Updated JK0-023 Actual Tests New Updated SY0-401 Actual Tests Oracle 1z0-053 PDF Oracle 1z0-053 Practice Test Oracle 1z0-053 Testing software Oracle 1z0-053 VCE VMware VCP-310 PDF VMware VCP-310 Testing software VMware VCP-310 VCE

Top Microsoft Exams

70-345 Dumps
70-410 Dumps
70-411 Dumps
70-412 Dumps
70-461 Dumps
70-462 Dumps
70-480 Dumps
70-483 Dumps
70-486 Dumps
70-487 Dumps
70-537 Dumps
70-703 Dumps
70-740 Dumps
70-741 Dumps
70-742 Dumps
70-743 Dumps
70-744 Dumps
70-762 Dumps
70-764 Dumps
70-767 Dumps
70-778 Dumps
77-725 Dumps
77-727 Dumps
98-365 Dumps
98-367 Dumps
98-381 Dumps
AI-100 Dumps
AZ-103 Dumps
AZ-203 Dumps
AZ-300 Dumps
AZ-301 Dumps
AZ-400 Dumps
AZ-500 Dumps
AZ-900 Dumps
DP-201 Dumps
MB-200 Dumps
MB-210 Dumps
MB-220 Dumps
MB-240 Dumps
MB-300 Dumps
MB-310 Dumps
MB-320 Dumps
MB-330 Dumps
MB-900 Dumps
MB6-894 Dumps
MD-100 Dumps
MD-101 Dumps
MS-100 Dumps
MS-101 Dumps
MS-200 Dumps
MS-201 Dumps
MS-202 Dumps
MS-300 Dumps
MS-302 Dumps
MS-500 Dumps
MS-900 Dumps

Full Microsoft Exams

70-333 Dumps
70-334 Dumps
70-339 Dumps
70-348 Dumps
70-357 Dumps
70-413 Dumps
70-414 Dumps
70-417 Dumps
70-463 Dumps
70-464 Dumps
70-465 Dumps
70-466 Dumps
70-467 Dumps
70-705 Dumps
70-713 Dumps
70-735 Dumps
70-745 Dumps
70-761 Dumps
70-765 Dumps
70-768 Dumps
70-777 Dumps
70-779 Dumps
77-418 Dumps
77-419 Dumps
77-420 Dumps
77-421 Dumps
77-422 Dumps
77-423 Dumps
77-424 Dumps
77-425 Dumps
77-426 Dumps
77-427 Dumps
77-428 Dumps
77-726 Dumps
77-728 Dumps
77-729 Dumps
77-730 Dumps
77-731 Dumps
77-881 Dumps
77-882 Dumps
77-883 Dumps
77-884 Dumps
77-885 Dumps
77-887 Dumps
77-888 Dumps
98-349 Dumps
98-361 Dumps
98-364 Dumps
98-366 Dumps
98-368 Dumps
98-369 Dumps
98-375 Dumps
98-382 Dumps
98-383 Dumps
98-388 Dumps
DP-100 Dumps
DP-200 Dumps
MB-230 Dumps
MB2-706 Dumps
MB2-707 Dumps
MB2-708 Dumps
MB2-710 Dumps
MB2-711 Dumps
MB2-712 Dumps
MB2-713 Dumps
MB2-714 Dumps
MB2-716 Dumps
MB6-897 Dumps
MB6-898 Dumps
MO-100 Dumps
MO-200 Dumps
MO-300 Dumps
MS-301 Dumps

Microsoft Certifications Exams

Microsoft Cisco VMware CompTIA Dumps VCE and PDF
Microsoft Exams Dumps
Microsoft MCITP Exams Practice Questions and Answers

[Free] 2018(Apr) EnsurePass Braindumps CompTIA SY0-401 Dumps with VCE and PDF 771-780
Recommended for you...

[Free] 2018(Apr) EnsurePass Braindumps CompTIA SY0-401 Dumps with VCE and PDF 771-780

by admin
[Free] 2018(Apr) EnsurePass Braindumps CompTIA SY0-401 Dumps with VCE and PDF 1011-1020
Recommended for you...

[Free] 2018(Apr) EnsurePass Braindumps CompTIA SY0-401 Dumps with VCE and PDF 1011-1020

by admin
[Free] 2018(Apr) EnsurePass Braindumps CompTIA SY0-401 Dumps with VCE and PDF 661-670
Recommended for you...

[Free] 2018(Apr) EnsurePass Braindumps CompTIA SY0-401 Dumps with VCE and PDF 661-670

by admin

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

© Copyright 2019 Microsoft Azure MCSD MCSE MCSA MCTS Exams Questions Online. All Rights Reserved. The Ultralight | Developed By Rara Theme. Powered by WordPress.