{"id":81107,"date":"2022-01-25T03:16:46","date_gmt":"2022-01-25T08:46:46","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=81107"},"modified":"2023-11-30T21:23:27","modified_gmt":"2023-12-01T02:53:27","slug":"comptia-security-certification-exam-questions","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/","title":{"rendered":"25 Free Questions on CompTIA Security+ (SY0-601) Certification Exam"},"content":{"rendered":"<p>CompTIA Security+ Certification is one of the most popular and demanded security certification in the industry. This certification exam validates your basic skills on security and cybersecurity. This exam is launched from November 2021.<\/p>\n<p>In this article, we are listing down 25 free sample exam questions for the certification CompTIA Security+ (SY0-601). These questions are part of Whizlabs exam simulator. If you are preparing for this certification exam, please buy complete set of <a href=\"https:\/\/www.whizlabs.com\/comptia-security\/\">practice questions for CompTIA Security exam<\/a>.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#CompTIA_Security_Exam_Sample_Questions\" >CompTIA Security Exam Sample Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Threats_Attacks_and_Vulnerabilities\" >Domain : Threats, Attacks, and Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Threats_Attacks_and_Vulnerabilities-2\" >Domain : Threats, Attacks, and Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Threats_Attacks_and_Vulnerabilities-3\" >Domain : Threats, Attacks, and Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Threats_Attacks_and_Vulnerabilities-4\" >Domain : Threats, Attacks, and Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Threats_Attacks_and_Vulnerabilities-5\" >Domain : Threats, Attacks, and Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Threats_Attacks_and_Vulnerabilities-6\" >Domain : Threats, Attacks, and Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Threats_Attacks_and_Vulnerabilities-7\" >Domain : Threats, Attacks, and Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Threats_Attacks_and_Vulnerabilities-8\" >Domain : Threats, Attacks, and Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Architecture_and_Design\" >Domain : Architecture and Design<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Architecture_and_Design-2\" >Domain : Architecture and Design<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Architecture_and_Design-3\" >Domain : Architecture and Design<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Architecture_and_Design-4\" >Domain : Architecture and Design<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Architecture_and_Design-5\" >Domain : Architecture and Design<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Architecture_and_Design-6\" >Domain : Architecture and Design<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Architecture_and_Design-7\" >Domain : Architecture and Design<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Implementation\" >Domain : Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Implementation-2\" >Domain : Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Implementation-3\" >Domain : Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Implementation-4\" >Domain : Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Implementation-5\" >Domain : Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Implementation-6\" >Domain : Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Implementation-7\" >Domain : Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Implementation-8\" >Domain : Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Operations_and_Incident_Response\" >Domain : Operations and Incident Response<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-security-certification-exam-questions\/#Domain_Operations_and_Incident_Response-2\" >Domain : Operations and Incident Response<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"CompTIA_Security_Exam_Sample_Questions\"><\/span><span style=\"color: #000080;\">CompTIA Security Exam Sampl<\/span><span style=\"color: #000080;\">e Questions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Threats_Attacks_and_Vulnerabilities\"><\/span><span style=\"font-weight: 400;\">Domain : Threats, Attacks, and Vulnerabilities<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q1 :<\/span> <span style=\"font-weight: 400;\">You were visiting a website but accidentally misspelt the name. You were taken to the same website that you intended to visit. After you exit the website, your system becomes unstable. Which of the following attacks has occurred?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Typosquatting<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Spear Phishing<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Whaling<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Prepending<\/span><\/p>\n<p><b>Correct Answer: A\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Typosquatting is a type of attack in which attackers register intentionally misspelled domain names similar to popular domain names like Google.com. Attackers would register a similar domain name, such as gogle.com or gooogle.com, malicious websites.<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. Typosquatting is an attack in which attackers register intentionally misspelled domain names similar to popular domain names like Google.com. Attackers would register a similar domain name, such as gogle.com or gooogle.com, malicious websites.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Spear phishing is a social engineering attack that targets individuals in an organization.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> Whaling is a social engineering attack that targets high-profiled individuals in an organization.<\/span><br \/>\n<b>Option D is incorrect.<\/b> <span style=\"font-weight: 400;\">Prepending is adding a disclaimer or information text to the emails received from external domains.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about typosquatting, please refer to the doc below: <\/span><a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-typosquatting\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What is Typosquatting? | Kaspersky<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Threats_Attacks_and_Vulnerabilities-2\"><\/span><span style=\"font-weight: 400;\">Domain : Threats, Attacks, and Vulnerabilities<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em>Q2 : Someone has created a Facebook page with your name. The Facebook page contains your information and photos. Which type of social engineering attack has occurred?<\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Impersonation<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Identity Theft<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Whaling<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Spear Phishing<\/span><\/p>\n<p><b>Correct Answer: B\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, the identity theft attack has occurred. In this attack, the attacker uses someone else\u2019s information and photos and uses it for a malicious purpose.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. An impersonation attack occurs when the attacker pretends to be someone else<\/span><span style=\"font-weight: 400;\"> to extract information from a victim.<\/span><br \/>\n<b>Option B is correct.<\/b> <span style=\"font-weight: 400;\">In this scenario, an identity theft attack has occurred. In this attack, the attacker uses someone else\u2019s information and photos and uses it for a malicious purpose.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> Whaling is a social engineering attack that targets high-profiled individuals in an organization.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Spear phishing is a social engineering attack that targets individuals in an organization.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about identity theft, please refer to the doc below: <\/span><a href=\"https:\/\/www.investopedia.com\/terms\/i\/identitytheft.asp\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Identity Theft Definition (investopedia.com)<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Threats_Attacks_and_Vulnerabilities-3\"><\/span><span style=\"font-weight: 400;\">Domain : Threats, Attacks, and Vulnerabilities<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q3 :<\/span> <span style=\"font-weight: 400;\">Which of the following can be the carrier for a backdoor trojan into a system?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Fileless<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Worm<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Trojan Horse<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Logic bomb<\/span><\/p>\n<p><b>Correct Answer: C\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A trojan horse is malware hidden inside a legitimate executable file. It allows the attacker to gain backdoor access to the system.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. The fileless virus does not depend on an executable file. It is rather loaded into the memory and becomes difficult to detect by antimalware applications.\u00a0<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> A worm is a malware that infects one system and then travels over the network to infect the other systems by replicating itself.<\/span><br \/>\n<b>Option C is correct.<\/b><span style=\"font-weight: 400;\"> A trojan horse is malware that is hidden inside a legitimate executable file. It allows the attacker to gain backdoor access to the system.\u00a0<\/span><br \/>\n<b>Option D is <\/b><b>in<\/b><b>correct.<\/b><span style=\"font-weight: 400;\"> A logic bomb works with a certain condition or criteria. In this scenario, it can be assumed that rebooting the fileserver was a condition that deleted the files afterward.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about the trojan horse, please refer to the doc below: <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/backdoor-trojan\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Backdoor Trojan &#8211; Firewalls.com<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Threats_Attacks_and_Vulnerabilities-4\"><\/span><span style=\"font-weight: 400;\">Domain : Threats, Attacks, and Vulnerabilities<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q4 :<\/span> <span style=\"font-weight: 400;\">Which of the following attack reverse a cryptography hash function?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Dictionary attack<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Password spraying attack<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Brute-force attack<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Rainbow table attack<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A rainbow table contains a list of hashes for passwords. When an attacker gains access to the password hashes, it can run them against the rainbow table and get the real password. In a rainbow table attack, an attacker does not try the real passwords but attempts to get the password hashes that can be run against the hashes in the rainbow table.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. A dictionary attack uses a dictionary and tries words as passwords against a user account. It cannot circumvent an account lockout because the account gets locked out after a certain number of wrong password attempts.\u00a0<\/span><br \/>\n<b>Option B is incorrect.<\/b> <span style=\"font-weight: 400;\">A password spraying attack is conducted to circumvent the account lockout. It attempts to access several user accounts with the same password. An account lockout policy locks an account if there are many wrong password attempts. There is only one password attempted with one user account in password spraying. It escapes the account lockout policy and does not get detected.<\/span><br \/>\n<b>Option C is incorrect.<\/b> <span style=\"font-weight: 400;\">A brute-force uses a combination of letters, numbers, and special characters as passwords against a user account. It cannot circumvent an account lockout because the account gets locked out after a certain number of wrong password attempts.\u00a0<\/span><br \/>\n<b>Option D is correct.<\/b><span style=\"font-weight: 400;\"> A rainbow table contains a list of hashes for passwords. When an attacker gains access to the password hashes, it can run them against the rainbow table and get the real password. In a rainbow table attack, an attacker does not try the real passwords but attempts to get the password hashes that can be run against the hashes in the rainbow table.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about rainbow tables, please refer to the doc below: <\/span><a href=\"https:\/\/cyberhoot.com\/cybrary\/rainbow-tables\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Rainbow Tables &#8211; CyberHoot Cyber Library<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Threats_Attacks_and_Vulnerabilities-5\"><\/span><span style=\"font-weight: 400;\">Domain : Threats, Attacks, and Vulnerabilities<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q5 : An attacker inserted a piece of malicious code into a live process. Which of the following type of attack is taking place?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Buffer overflow<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>DLL Injection<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Privilege escalation<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Replay attack<\/span><\/p>\n<p><b>Correct Answer: B\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, the DLL injection attack is occurring. DLL In this type of attack, a piece of malicious code is inserted into a live process. This way, the legitimate process uses the malicious inserted code via DLL.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. In a buffer overflow attack, the attacker sends a large volume of data to the application&#8217;s storage space in memory. If the storage space is filled, it causes the buffer overflow error.\u00a0<\/span><br \/>\n<b>Option B is correct.<\/b> <span style=\"font-weight: 400;\">In this scenario, the DLL injection attack is occurring. DLL In this type of attack, a piece of malicious code is inserted into a live process. This way, the legitimate process uses the malicious inserted code via DLL.<\/span> <span style=\"font-weight: 400;\">\u00a0<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> The attacker gains administrative privileges after compromising a server in a privilege escalation attack.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> In a replay attack, the attacker captures a user\u2019s web session with a packet capturing tool and then uses the same session ID to initiate another session.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about DLL injection, please refer to the doc below: <\/span><a href=\"https:\/\/attack.mitre.org\/techniques\/T1055\/001\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Process Injection: Dynamic-link Library Injection, Sub-technique T1055.001 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Threats_Attacks_and_Vulnerabilities-6\"><\/span><span style=\"font-weight: 400;\">Domain : Threats, Attacks, and Vulnerabilities<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q6 : An attacker is using the hashes to crack an authentication protocol. Which type of attack is occurring?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Replay attack<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Pass the Hash<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Buffer overflow<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Privilege escalation<\/span><\/p>\n<p><b>Correct Answer: B\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, the pass the hash attack is occurring. In this attack, the attacker captures the password hashes. Instead of decrypting the hashes, the attacker uses the hashes to crack the authentication protocol.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. In a replay attack, the attacker captures a user\u2019s web session with a packet capturing tool and then uses the same session ID to initiate another session.<\/span><br \/>\n<b>Option B is correct.<\/b> <span style=\"font-weight: 400;\">In this scenario, the pass the hash attack is occurring. In this attack, the attacker captures the password hashes. Instead of decrypting the hashes, the attacker uses the hashes to crack the authentication protocol.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><br \/>\n<b>Option C is incorrect.<\/b> <span style=\"font-weight: 400;\">In a buffer overflow attack, the attacker sends a large volume of data to the application&#8217;s storage space in memory. If the storage space is filled, it causes the buffer overflow error.<\/span><br \/>\n<b>Option D is incorrect.<\/b> <span style=\"font-weight: 400;\">The attacker gains administrative privileges after compromising a server in a privilege escalation attack.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about Pass the Hash, please refer to the doc below: <\/span><a href=\"https:\/\/www.beyondtrust.com\/resources\/glossary\/pass-the-hash-pth-attack\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What is a Pass-the-Hash Attack (PtH)? Get Definitions and Explanations in Our Security Term Glossary | BeyondTrust<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Threats_Attacks_and_Vulnerabilities-7\"><\/span><span style=\"font-weight: 400;\">Domain : Threats, Attacks, and Vulnerabilities<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q7 : A group of attackers stole sensitive information in an attack. After this attack, you found that they had been in the network for several months during the investigation. Which type of attackers were these?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Advanced Persistent Threat (APTs)<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Hacktivists<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Script Kiddies<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Insider Threat<\/span><\/p>\n<p><b>Correct Answer: A\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, the attack is conducted by the APTs, who tend to stay low profile and can cause serious damage by stealing sensitive information. They work with their customized attack tools to conduct complex attacks.\u00a0<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">In this scenario, the attack is conducted by the APTs, who tend to stay low profile and can cause serious damage by stealing sensitive information. They work with their customized attack tools to conduct complex attacks.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Hacktivists have specific views, and if a government or organization does something opposing these views, the hacktivists are likely to attack them. In this scenario, the hacktivists group conducted the attack against the passed law.\u00a0<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> Script kiddies are inexperienced hackers who tend to use readily available tools.<\/span><span style=\"font-weight: 400;\"> A political motive does not drive them.\u00a0<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> An insider threat originates from within an organization. The insider threats have their intentions to exfiltrate data or cause damage, but a political motive does not drive them.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about APTs, please refer to the doc below: <\/span><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/apt-advanced-persistent-threat\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What is APT (Advanced Persistent Threat) | APT Security | Imperva<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Threats_Attacks_and_Vulnerabilities-8\"><\/span><span style=\"font-weight: 400;\">Domain : Threats, Attacks, and Vulnerabilities<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q8 : An attacker has exploited a zero-day vulnerability in an Internet-facing application. Which of the following is true about this attack?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>There was no patch available for the vulnerability<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>An insider conducted the attack<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>The attack was conducted by an Advanced Persistent Threat (APTs)<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>The application was not updated with the latest security updates<\/span><\/p>\n<p><b>Correct Answer: A\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There was no patch available for the vulnerability in this scenario. A zero-day attack occurs on a vulnerability that has never been discovered before, and therefore, it is obvious that there are no patches available for it.\u00a0<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">A zero-day attack occurs on a vulnerability that has never been discovered before and therefore, it is obvious that there are not patches available for it. In this scenario, there was no patch available for the vulnerability.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> The scenario does not indicate that an insider conducted the attack. Insider attacks are usually focused on stealing confidential and sensitive information.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> The scenario does not indicate that an APTs conducted the attack. APTs tend to stay low profile and can cause serious damage by stealing sensitive information. They work with their customized attack tools to conduct complex attacks.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Even when an application is updated with the latest security updates, a zero-day vulnerability can be discovered if it exists and is exploited.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about APTs, please refer to the doc below: <\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/zero-day-vulnerability\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Zero-Day Vulnerability &#8211; Definition (trendmicro.com)<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Architecture_and_Design\"><\/span><span style=\"font-weight: 400;\">Domain : Architecture and Design<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q9 : You want to name all systems on the network based on their department names. Which of the following should you use for this purpose?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Network diagram<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Baseline configuration<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>IP Schema<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Standard naming convention<\/span><\/p>\n<p><b>Correct Answer: D\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, you should use the standard naming convention, which helps you set specific names based on the team, department, room, or location.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Network diagrams define the network architecture and its components.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Baseline configuration is a standardized configuration of a system. Using baseline configuration, you can configure other systems in a standardized manner.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> IP Schema defines the IP configuration of systems in a network. You can define a specific series of IP addresses to one department and another IP series to another department.<\/span><br \/>\n<b>Option D is correct.<\/b> <span style=\"font-weight: 400;\">You should use the standard naming convention, which helps you set specific names based on the team, department, room, or location. <\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about the standard naming convention, please refer to the doc below: <\/span><a href=\"https:\/\/www.viewpoint.com\/blog\/bs1192-naming-convention\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">BS1192 Naming Convention | Trimble Viewpoint<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Architecture_and_Design-2\"><\/span><span style=\"font-weight: 400;\">Domain : Architecture and Design<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q10 : You have decided to move your software development environment to the cloud. Which type of cloud delivery model would you be using in this scenario?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>IaaS<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>PaaS<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>SaaS<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>XaaS<\/span><\/p>\n<p><b>Correct Answer: B\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, you would be using PaaS, <\/span><span style=\"font-weight: 400;\">Platform As A Service allows you to develop and maintain applications in the cloud.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. IaaS is Infrastructure As A Service, which allows you to set up an entire network or datacenter in the cloud. In this scenario, you have only to use an application.\u00a0<\/span><br \/>\n<b>Option B is correct.<\/b><span style=\"font-weight: 400;\"> PaaS is Platform As A Service that allows you to develop and maintain applications in the cloud.\u00a0<\/span><br \/>\n<b>Option C is <\/b><b>in<\/b><b>correct.<\/b><span style=\"font-weight: 400;\"> In this scenario, you would be using the SaaS cloud delivery model, which allows you to use a cloud-hosted application. This reduces cost because you don\u2019t have to purchase the application and work with subscriptions.\u00a0<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> XaaS is Anything As A Service, allowing you to use anything in the cloud virtually. In this scenario, you have only to use an application.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about the SaaS, please refer to the doc below:<\/span><a href=\"https:\/\/edge.siriuscom.com\/cloud\/the-top-3-cloud-computing-service-models\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">The Top 3 Cloud Computing Service Models (siriuscom.com)<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Architecture_and_Design-3\"><\/span><span style=\"font-weight: 400;\">Domain : Architecture and Design<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q11 : You want to perform integration testing of the application that you are developing. You also need to measure the application performance. Which of the following environment should you use for this purpose?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Development<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Testing<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Staging<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Production<\/span><\/p>\n<p><b>Correct Answer: B\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, you need to use the testing environment isolated from the development environment. You perform the integration testing of various components that you have developed along with the application&#8217;s performance.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">You write code and build the application in the development environment.<\/span><br \/>\n<b>Option B is correct.<\/b> <span style=\"font-weight: 400;\">You need to use the testing environment, which is isolated from the development environment. You perform the integration testing of various components that you have developed along with the application&#8217;s performance.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> An application is deployed in staging before deploying it in the production environment. You perform the unit testing in the staging environment. It is almost a replica of the production environment with the same security and configuration settings.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> The production environment is the live environment. After staging, the application is deployed in the production environment when the results are as expected.\u00a0<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about the testing environment, please refer to the doc below: <\/span><a href=\"https:\/\/www.plesk.com\/blog\/product-technology\/staging-environment-vs-test-environment\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">The staging environment vs. test environment: What&#8217;s the difference? &#8211; Plesk<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Domain_Architecture_and_Design-4\"><\/span><span style=\"font-weight: 400;\">Domain : Architecture and Design<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h4><em><span style=\"font-weight: 400;\">Q12 : Which of the following is the biggest challenge in code reuse?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>It is difficult to test<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>It requires more time to develop<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>It introduces more bugs<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>It is difficult to integrate<\/span><\/p>\n<p><b>Correct Answer: B\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">One of the biggest challenges in code reuse is the development time. Because you want the code to be reused later in other applications, you need to plan and develop it carefully.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">When you develop code, you test it thoroughly. When you reuse the code, the same code is tested only for integration.<\/span><br \/>\n<b>Option B is correct.<\/b> <span style=\"font-weight: 400;\">One of the biggest challenges in code reuse is the development time. Because you want the code to be reused later in other applications, you need to plan and develop it carefully.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> The code that needs to be reused is already tested. Therefore, there are fewer bugs or even no bugs compared to the newly developed code.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> The code is developed with its reusability in mind, and therefore, integration is not always a problem.\u00a0<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about code reusability, please refer to the doc below:<\/span><a href=\"https:\/\/www.perforce.com\/blog\/qac\/what-code-reuse-code-reuse-best-practices\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What Is Code Reuse?\u00a0How To Effectively Reuse Code | Perforce<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Architecture_and_Design-5\"><\/span><span style=\"font-weight: 400;\">Domain : Architecture and Design<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q13 : You receive a One Time Password (OTP) on your mobile phone. Which of the following is it an example of?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Something you know<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Something you have<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Something you exhibit<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Something you are<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Passwords and OTPs are an example of something you know. It is typically used in two-factor or multi-factor authentication.<\/span><\/p>\n<p><b>Option A is correct.<\/b> <span style=\"font-weight: 400;\">Passwords and OTPs are an example of something you know. It is typically used in two-factor or multi-factor authentication.<\/span><br \/>\n<b>Option B is incorrect.<\/b> <span style=\"font-weight: 400;\">A smart card is an example of something you have.<\/span><br \/>\n<b>Option C is incorrect.<\/b> <span style=\"font-weight: 400;\">The way you talk or walk is an example of something you exhibit.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> A retina or fingerprint is an example of something you are.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about something you have, please refer to the doc below: <\/span><a href=\"https:\/\/www.professormesser.com\/security-plus\/sy0-601\/sy0-601-video\/multi-factor-authentication-5\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Multi-factor Authentication &#8211; SY0-601 CompTIA Security+ : 2.4 &#8211; Professor Messer IT Certification Training Courses<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Architecture_and_Design-6\"><\/span><span style=\"font-weight: 400;\">Domain : Architecture and Design<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q14 : Which of the following defines False Rejection Rate (FRR)?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>An illegitimate or wrong user is authenticated<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>A legitimate user wrongly fails authenticated<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>An illegitimate user is not authenticated<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>It is equal to the Crossover Error Rate (CRR)<\/span><\/p>\n<p><b>Correct Answer: B\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Crossover Error Rate is the percentage of times when FAR and FRR are equal. False rejection rate (FRR) occurs when a legitimate user is not authenticated. FAR occurs when an illegitimate or wrong user is authenticated successfully. CRR occurs when FAR and FRR are equal.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b> <span style=\"font-weight: 400;\">FAR occurs when an illegitimate or wrong user is authenticated successfully.<\/span><br \/>\n<b>Option B is correct.<\/b> <span style=\"font-weight: 400;\">False rejection rate (FRR) occurs when a legitimate user is wrongly not authenticated. FAR occurs when an illegitimate or wrong user is authenticated successfully.\u00a0<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> This is incorrect. An illegitimate user should not be authenticated. Neither FAR nor FRR are related to it.<\/span><br \/>\n<b>Option D is incorrect.<\/b> <span style=\"font-weight: 400;\">CRR occurs when FAR and FRR are equal. FRR is not equal to CRR.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about FRR, please refer to the doc below: <\/span><a href=\"https:\/\/www.johndcook.com\/blog\/2018\/10\/31\/biometric-security-error\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Biometric security jargon: CER, EER, FRR, FAR (johndcook.com)<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Architecture_and_Design-7\"><\/span><span style=\"font-weight: 400;\">Domain : Architecture and Design<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q15 : You have configured NIC teaming in a critical server. Along with redundancy, which of the following does the NIC team provide?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Load balancing<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Multipath<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>High availability<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Scalability<\/span><\/p>\n<p><b>Correct Answer: A\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Along with redundancy, NIC teaming provides load balancing. The incoming traffic is distributed to the network interface cards (NICs).<\/span><\/p>\n<p><b>Option A is correct.<\/b> <span style=\"font-weight: 400;\">The incoming traffic is distributed to both the network interface cards (NICs). Along with redundancy, NIC teaming provides load balancing.<\/span><br \/>\n<b>Option B is incorrect.<\/b> <span style=\"font-weight: 400;\">Multipath is the path between the CPUs and the RAID systems.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> High availability is about keeping the servers and applications available around the clock. High availability applications have minimum downtime.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Scalability is the ability to provide more resources to the applications as they demand more due to peak load.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about NIC Teaming, please refer to the doc below: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/technologies\/nic-teaming\/nic-teaming\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">NIC Teaming | Microsoft Docs<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implementation\"><\/span><span style=\"font-weight: 400;\">Domain : Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q16 : Which of the following would be a secure replacement of Telnet?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>HTTPS<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>DNSSec<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>SNMP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>SSH<\/span><\/p>\n<p><b>Correct Answer: D\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Telnet transmits the information in clear text and is rarely used. SSH is secure, replaces Telnet, and encrypts the channels information needs to travel.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. HTTPS is used for secure Web browsing. It is used instead of HTTP.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> DNSSEC is an extended and secure version of DNS.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> SNMP is used for monitoring network devices. SNMP v3 is a secure version.<\/span><br \/>\n<b>Option D is correct.<\/b> <span style=\"font-weight: 400;\">Telnet transmits the information in clear text and is rarely used. SSH is secure, replaces Telnet, and encrypts the channels information needs to travel.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about SSH, please refer to the doc below: <\/span><a href=\"https:\/\/www.guru99.com\/telnet-vs-ssh.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Telnet vs. SSH: Key Differences (guru99.com)<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implementation-2\"><\/span><span style=\"font-weight: 400;\">Domain : Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q17 : Which of the following protocol should you use to secure voice and video?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>IPSec<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>HTTPS<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>SFTP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>SRTP\u00a0<\/span><\/p>\n<p><b>Correct Answer: D\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">From the given choices, you need to use SRTP, which stands for Secure Real-time Transport Protocol (SRTP). It is mainly used to secure voice and video transmissions.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. IPSec is used with VPNs to authenticate and encrypt data packets.\u00a0<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> HTTPS is used for secure Web browsing.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> SFTP uses SSH for secure file transfer.<\/span><br \/>\n<b>Option D is correct.<\/b> <span style=\"font-weight: 400;\">SRTP stands for Secure Real-time Transport Protocol (SRTP). It is mainly used to secure voice and video transmissions.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about SRTP, please refer to the doc below: <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Secure_Real-time_Transport_Protocol\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Secure Real-time Transport Protocol &#8211; Wikipedia<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implementation-3\"><\/span><span style=\"font-weight: 400;\">Domain : Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q18 : You want to perform a code scan to find any malicious code hidden inside. Which of the following method should you use?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Use a sandbox<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Perform a static analysis<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Perform a dynamic analysis<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Conduct fuzzing\u00a0<\/span><\/p>\n<p><b>Correct Answer: B\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Static code analysis requires you to review the code and find errors and malicious code hidden inside it.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">You should use a sandbox where you can inspect the malware. A sandbox is an isolated environment often used to test the applications. The impact of malware or a malicious application is retained within the sandbox.<\/span><br \/>\n<b>Option B is correct.<\/b><span style=\"font-weight: 400;\"> Static code analysis requires you to review the code and find errors and malicious code hidden inside it.\u00a0<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> To perform dynamic analysis, you need to execute the malware, which will impact the host system. Dynamic analysis is always performed when the application is running.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Fuzzing is about injecting random data into an application to detect errors.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about static code analysis, please refer to the doc below: <\/span><a href=\"https:\/\/www.perforce.com\/blog\/sca\/what-static-analysis\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What Is Static Analysis? Static Code Analysis Overview | Perforce<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implementation-4\"><\/span><span style=\"font-weight: 400;\">Domain : Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q19 : In which of the wireless network, a user does not need to know the password to connect?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>WPS<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>WEP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>WPA<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>WPA2<\/span><\/p>\n<p><b>Correct Answer: A\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">WiFi Direct uses WPS protocol, which exchanges credentials. Users are not required to know the password to connect using WPS.<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">WiFi Direct uses WPS protocol, which exchanges credentials. Users are not required to know the password to connect using WPS.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> The wireless devices no longer support WEP. It is a weak wireless protocol that uses symmetric encryption.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> WPA used 128-bit encryption and was used to replace WEP. WPA is also no longer used.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> WPA2 is an advanced version of WPA. It is still in existence and can be used with pre-shared keys or enterprise mode, which uses a RADIUS server.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about WPS, please refer to the doc below: <\/span><a href=\"https:\/\/www.digitalcitizen.life\/simple-questions-what-wps-wi-fi-protected-setup\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Simple questions: What is WPS (Wi-Fi Protected Setup) and how does it work? | Digital Citizen<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implementation-5\"><\/span><span style=\"font-weight: 400;\">Domain : Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q20 : If you compromise a jump server, which of the following outcomes is likely to occur as an attacker?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>You will have access to the entire network<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>You will be navigated to a restricted and isolated environment<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>You will have access to the jump server only<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>You will be navigated to the DMZ environment<\/span><\/p>\n<p><b>Correct Answer: A\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A jump server is a server that authenticates the users before they can access a network. It is like a gatekeeper. After the users are authenticated, they can access the network with fewer restrictions. If the jump server is compromised, the attacker virtually has access to the entire network.<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">A jump server is a server that authenticates the users before they can access a network. It is like a gatekeeper. After the users are authenticated, they can access the network with fewer restrictions. If the jump server is compromised, the attacker virtually has access to the entire network.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> This is not true. The attacker will have access to the entire network.\u00a0<\/span><br \/>\n<b>Option C is incorrect.<\/b> <span style=\"font-weight: 400;\">This is not true. The attacker will have access to the entire network.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> This is not true. The attacker will have access to the entire network.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about jump servers, please refer to the doc below: <\/span><a href=\"https:\/\/jumpcloud.com\/blog\/jump-servers-obsolete\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Why Jump Servers Are Obsolete &#8211; JumpCloud<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implementation-6\"><\/span><span style=\"font-weight: 400;\">Domain : Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q21 : You have configured a root and two subordinate certificate authorities. You want to ensure that the root server is highly secured. Which of the following recommended method should you use?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Power off the root server and keep it offline<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Break the replication between the root and subordinate servers<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Move the subordinate servers to a different network<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Have only administrator\u2019s access to the root server<\/span><\/p>\n<p><b>Correct Answer: A\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To ensure that a root certificate authority is highly secure, you should power off the root server and keep it offline. If the root server is compromised, the entire certificate authority environment is compromised.<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">To ensure that a root certificate authority is highly secure, you should power off the root server and keep it offline. If the root server is compromised, the entire certificate authority environment is compromised.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> No replication takes place between the root server and subordinate certificate authorities.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> Moving the certificate authorities to a different network will not make an impact. It is the root server that needs to be secured.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Any access to the root server is a high risk.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about securing root certificate authority, please refer to the doc below: <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Offline_root_certificate_authority\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Offline root certificate authority &#8211; Wikipedia<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implementation-7\"><\/span><span style=\"font-weight: 400;\">Domain : Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q22 : Which of the following can reduce the impact of lateral movement in an attack?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Network segmentation<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>VPN<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Screened subnet<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Private subnet<\/span><\/p>\n<p><b>Correct Answer: A\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">When an attack occurs on a network, the attacker wants to perform the lateral movement to search for sensitive information. This usually happens when you have a flat network. With the help of network segmentation, you can reduce the attack by preventing the attacker from moving laterally in the network.\u00a0<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">When an attack occurs on a network, the attacker wants to perform the lateral movement to search for sensitive information. This usually happens when you have a flat network. With the help of network segmentation, you can reduce the attack by preventing the attacker from moving laterally in the network.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> A VPN or Virtual Private Network is used for remote connectivity.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> A screened subnet is the DMZ or demilitarized zone, which hosts the Internet-facing servers.\u00a0<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> A private subnet is a subnet that is locally located within a network. It is not accessible to the outside world.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about network segmentation, please refer to the doc below: <\/span><a href=\"https:\/\/www.guardicore.com\/microsegmentation\/lateral-movement-security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Lateral Movement Security Micro-Segmentation | Guardicore<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implementation-8\"><\/span><span style=\"font-weight: 400;\">Domain : Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q23 : When using OAuth 2.0, other than JSON, which other protocol is used?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>IPSec<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>SMTP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>HTTP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>HTTPS<\/span><\/p>\n<p><b>Correct Answer: C\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">When an attack occurs on a network, the attacker wants to perform the lateral movement to search for sensitive information. This usually happens when you have a flat network. With the help of network segmentation, you can reduce the attack by preventing the attacker from moving laterally in the network.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">IPSec is used for securing network transmission in VPN.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> SMTP is for sending emails over the Internet.<\/span><br \/>\n<b>Option C is correct.<\/b><span style=\"font-weight: 400;\"> When using OAuth 2.0, other than JSON, HTTP is the second protocol used.\u00a0<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> HTTPS is used for secure Web browsing.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about network segmentation, please refer to the doc below: <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/OAuth\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">OAuth &#8211; Wikipedia<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operations_and_Incident_Response\"><\/span><span style=\"font-weight: 400;\">Domain : Operations and Incident Response<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q24 : You are about to initiate a penetration test. You want first to gather the email IDs of the employees. Which of the following tool should you use?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Cuckoo\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Nessus\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>sn1per<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>theHarvester<\/span><\/p>\n<p><b>Correct Answer: D\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">theHarvester is an open-source tool specializing in gathering information, such as emails, employee information, sub-domains, and hostnames. It can use a variety of search engines, such as Google and Bing, and other platforms, such as LinkedIn.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Cuckoo is an open-source sandbox for malware analysis.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Nessus is a vulnerability management tool.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> sn1per is an information gathering and penetration testing platform. It helps you discover the attack surface and handle risks.<\/span><br \/>\n<b>Option D is correct.<\/b><span style=\"font-weight: 400;\"> theHarvester is an open-source tool specializing in gathering information, such as emails, employee information, sub-domains, and hostnames. It can use a variety of search engines, such as Google and Bing, and other platforms, such as LinkedIn.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about <\/span><span style=\"font-weight: 400;\">theHarvester<\/span><span style=\"font-weight: 400;\">, please refer to the doc below: <\/span><a href=\"https:\/\/www.geeksforgeeks.org\/python-theharvester-how-to-use-it\/#:~:text=theHarvester%20is%20another%20tool%20like,servers%20and%20SHODAN%20computer%20database.\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Python theHarvester &#8211; How to use it? &#8211; GeeksforGeeks<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operations_and_Incident_Response-2\"><\/span><span style=\"font-weight: 400;\">Domain : Operations and Incident Response<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q25 : You are about to initiate a penetration test. Instead of using theHarvester tool, you want to use an alternative to enumerate subdomains. Which of the following tools can serve as an alternative to theHarvester?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Cuckoo\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Metasploit<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>sn1per<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>sublist3r\u00a0<\/span><\/p>\n<p><b>Correct Answer: D\u00a0<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The sublist3r tool is an alternate to theHarvester tool. It can be used to enumerate subdomains.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Cuckoo is an open-source sandbox for malware analysis.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Metasploit is a penetration testing framework that allows you to use existing exploits or write custom ones to exploit existing vulnerabilities.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> sn1per is an information gathering and penetration testing platform. It helps you discover the attack surface and handle risks.<\/span><br \/>\n<b>Option D is correct.<\/b><span style=\"font-weight: 400;\"> The sublist3r tool is an alternate to theHarvester tool. It can be used to enumerate subdomains.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> To know more about <\/span><span style=\"font-weight: 400;\">sublist3r<\/span><span style=\"font-weight: 400;\">, please refer to the doc below:<\/span><a href=\"https:\/\/github.com\/aboul3la\/Sublist3r\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">GitHub &#8211; aboul3la\/Sublist3r: Fast subdomains enumeration tool for penetration testers<\/span><\/a><\/p>\n<p>Hope this article helped you to get some idea on how the sample questions of CompTIA Security Certification Exam looks like. If you have any questions on this security certification exam, please contact us.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CompTIA Security+ Certification is one of the most popular and demanded security certification in the industry. This certification exam validates your basic skills on security and cybersecurity. This exam is launched from November 2021. In this article, we are listing down 25 free sample exam questions for the certification CompTIA Security+ (SY0-601). These questions are part of Whizlabs exam simulator. If you are preparing for this certification exam, please buy complete set of practice questions for CompTIA Security exam. CompTIA Security Exam Sample Questions Domain : Threats, Attacks, and Vulnerabilities Q1 : You were visiting a website but accidentally misspelt [&hellip;]<\/p>\n","protected":false},"author":359,"featured_media":81186,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[10],"tags":[],"class_list":["post-81107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing-certifications"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",600,315,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam-150x150.jpeg",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam-300x158.jpeg",300,158,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",600,315,false],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",600,315,false],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",600,315,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",600,315,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",24,13,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",48,25,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",96,50,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",150,79,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",300,158,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam-250x250.jpeg",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",600,315,false],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",96,50,false],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/01\/Free-Questions-on-CompTIA-Security-SY0-601-Certification-Exam.jpeg",150,79,false]},"uagb_author_info":{"display_name":"Abilesh Premkumar","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/abilesh\/"},"uagb_comment_info":89,"uagb_excerpt":"CompTIA Security+ Certification is one of the most popular and demanded security certification in the industry. This certification exam validates your basic skills on security and cybersecurity. This exam is launched from November 2021. In this article, we are listing down 25 free sample exam questions for the certification CompTIA Security+ (SY0-601). These questions are&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/359"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=81107"}],"version-history":[{"count":11,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81107\/revisions"}],"predecessor-version":[{"id":92366,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81107\/revisions\/92366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/81186"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=81107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=81107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=81107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}