100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

401 SEC+ Exam Guaranteed Pass: Complete Solutions & Graded Questions with Correct Answers

Puntuación
-
Vendido
-
Páginas
21
Grado
A+
Subido en
25-12-2024
Escrito en
2024/2025

401 SEC+ Exam Guaranteed Pass: Complete Solutions & Graded Questions with Correct Answers

Institución
401 SEC+
Grado
401 SEC+










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
401 SEC+
Grado
401 SEC+

Información del documento

Subido en
25 de diciembre de 2024
Número de páginas
21
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

  • 401 sec exam

Vista previa del contenido

401 SEC+ Exam Guaranteed Pass: Complete
Solutions & Graded Questions with Correct
Answers Tailored for Top Grades
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which
of the following attacks? (Select TWO).

A. Spoofing

B. Man-in-the-middle

C. Dictionary

D. Brute force

E. Privilege escalation - -correct ans- -



A file on a Linux server has default permissions of rw-rw-r--. The system administrator has
verified that Ann, a user, is not a member of the group owner of the file. Which of the
following should be modified to assure that Ann has read access to the file?

A. User ownership information for the file in question

B. Directory permissions on the parent directory of the file in question

C. Group memberships for the group owner of the file in question

D. The file system access control list (FACL) for the file in question - -correct ans- -Answer:
C



Explanation:

The file permissions according to the file system access control list (FACL) are rw-rw-r--.

The first 'rw-' are the file owner permissions (read and write).

The second 'rw-' are the group permissions (read and write) for the group that has been
assigned the file.

The third 'r--' is the All Users permissions; in this case read only.

,To enable Ann to access the file, we should add Ann to the group that has been assigned to
the file.



Topic 6, Cryptography



Which of the following protocols uses an asymmetric key to open a session and then
establishes a symmetric key for the remainder of the session?

A. SFTP

B. HTTPS

C. TFTP

D. TLS - -correct ans- -Answer: D



Explanation:

SSL establishes a session using asymmetric encryption and maintains the session using
symmetric encryption.



A company uses PGP to ensure that sensitive email is protected. Which of the following
types of cryptography is being used here for the key exchange?

A. Symmetric

B. Session-based

C. Hashing

D. Asymmetric - -correct ans- -Answer: A



Explanation:

PGP combines symmetric-key encryption and public-key encryption. The message is
encrypted using a symmetric encryption algorithm, which requires a symmetric key. Each
symmetric key is used only once and is also called a session key.

, Which of the following is true about asymmetric encryption?

A. A message encrypted with the private key can be decrypted by the same key

B. A message encrypted with the public key can be decrypted with a shared key.

C. A message encrypted with a shared key, can be decrypted by the same key.

D. A message encrypted with the public key can be decrypted with the private key. - -
correct ans- -Answer: D



Explanation:

Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys
are referred to as the public key and the private key. The sender uses the public key to
encrypt a message, and the receiver uses the private key to decrypt the message; what one
key does, the other one undoes



Encryption used by RADIUS is BEST described as:

A. Quantum

B. Elliptical curve

C. Asymmetric

D. Symmetric - -correct ans- -Answer: D



Explanation:

The RADIUS server uses a symmetric encryption method.

Note: Symmetric algorithms require both ends of an encrypted message to have the same
key and processing algorithms. Symmetric algorithms generate a secret key that must be
protected.



Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.

A. Public keys, one time

B. Shared keys, private keys

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
HesiAtiExpert Western Governor\'S University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
48
Miembro desde
3 año
Número de seguidores
48
Documentos
452
Última venta
11 meses hace
Hesi and Ati Expert

I sell the actual recent screenshots of HESI and ATI exam with their correct answers. Incase of any concern, question and enquiry contact my email . All the best in your studies and Exam

4.9

85 reseñas

5
83
4
0
3
1
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes