Prev Next Question 6/97 - SY0-501.v2019-05-30

A company wants to host a publicity available server that performs the following functions:
Evaluates MX record lookup

Can perform authenticated requests for A and AAA records

Uses RRSIG

Which of the following should the company use to fulfill the above requirements?

Comments (The most recent comments are at the top.)

- Jul 07, 2019

Answer is E.

RRSIG (resource record signature)
Contains the DNSSEC signature for a record set. DNS resolvers verify the signature with a public key, stored in a DNSKEY record.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (97q)
Question 1: A new firewall has been places into service at an organizati...
1 commentQuestion 2: Which of the following network vulnerability scan indicators...
Question 3: An administrator is replacing a wireless router. The configu...
Question 4: A system's administrator has finished configuring firewall A...
Question 5: Which of the following specifically describes the exploitati...
1 commentQuestion 6: A company wants to host a publicity available server that pe...
Question 7: Which of the following must be intact for evidence to be adm...
Question 8: When considering a third-party cloud service provider, which...
Question 9: A systems administrator wants to protect data stored on mobi...
Question 10: As part of a new industry regulation, companies are required...
Question 11: Which of the following technologies employ the use of SAML? ...
1 commentQuestion 12: An analyst wants to implement a more secure wireless authent...
Question 13: A workstation puts out a network request to locate another s...
Question 14: A technician suspects that a system has been compromised. Th...
1 commentQuestion 15: An information security specialist is reviewing the followin...
Question 16: An attacker compromises a public CA and issues unauthorized ...
Question 17: A systems administrator is reviewing the following informati...
1 commentQuestion 18: A user clicked an email link that led to a website than infe...
Question 19: Which of the following are the MAIN reasons why a systems ad...
Question 20: A security administrator is developing controls for creating...
Question 21: A security administrator is configuring a new network segmen...
Question 22: A company hires a third-party firm to conduct an assessment ...
Question 23: An organization's file server has been virtualized to reduce...
1 commentQuestion 24: A security administrator has found a hash in the environment...
Question 25: A network administrator at a small office wants to simplify ...
Question 26: A director of IR is reviewing a report regarding several rec...
Question 27: A security analyst receives an alert from a WAF with the fol...
Question 28: A user has attempted to access data at a higher classificati...
1 commentQuestion 29: When performing data acquisition on a workstation, which of ...
Question 30: Which of the following encryption methods does PKI typically...
Question 31: A system administrator wants to provide for and enforce wire...
Question 32: A security analyst is hardening an authentication server. On...
Question 33: A company has a data system with definitions for "Private" a...
Question 34: An organization is using a tool to perform a source code rev...
Question 35: A security analyst is performing a quantitative risk analysi...
Question 36: Which of the following cryptography algorithms will produce ...
Question 37: Joe, a user, wants to send Ann, another user, a confidential...
Question 38: A company is developing a new secure technology and requires...
Question 39: An audit takes place after company-wide restricting, in whic...
Question 40: A security analyst observes the following events in the logs...
Question 41: When systems, hardware, or software are not supported by the...
Question 42: Which of the following is an important step to take BEFORE m...
Question 43: Which of the following attack types BEST describes a client-...
Question 44: An in-house penetration tester is using a packet capture dev...
Question 45: A security analyst is hardening a web server, which should a...
Question 46: A manager suspects that an IT employee with elevated databas...
Question 47: Which of the following cryptographic attacks would salting o...
Question 48: After a user reports slow computer performance, a system adm...
Question 49: An analyst is reviewing a simple program for potential secur...
Question 50: Which of the following AES modes of operation provide authen...
Question 51: A vulnerability scanner that uses its running service's acce...
Question 52: Before an infection was detected, several of the infected de...
Question 53: Which of the following would meet the requirements for multi...
Question 54: A database backup schedule consists of weekly full backups p...
Question 55: An organization uses SSO authentication for employee access ...
Question 56: A development team has adopted a new approach to projects in...
Question 57: An application team is performing a load-balancing test for ...
Question 58: Adhering to a layered security approach, a controlled access...
Question 59: To reduce disk consumption, an organization's legal departme...
Question 60: A company is terminating an employee for misbehavior. Which ...
Question 61: When connected to a secure WAP, which of the following encry...
Question 62: Which of the following types of attacks precedes the install...
Question 63: Two users need to send each other emails over unsecured chan...
Question 64: A department head at a university resigned on the first day ...
Question 65: A wireless network uses a RADIUS server that is connected to...
Question 66: Which of the following cryptographic algorithms is irreversi...
Question 67: Which of the following would MOST likely appear in an uncred...
Question 68: A systems administrator is attempting to recover from a cata...
Question 69: A high-security defense installation recently begun utilizin...
Question 70: An organization wishes to provide better security for its na...
Question 71: A security analyst is testing both Windows and Linux systems...
Question 72: An organization needs to implement a large PKI. Network engi...
Question 73: An auditor is reviewing the following output from a password...
Question 74: A system administrator wants to provide balance between the ...
Question 75: A black hat hacker is enumerating a network and wants to rem...
Question 76: A penetration tester finds that a company's login credential...
Question 77: An organization finds that most help desk calls are regardin...
Question 78: An employer requires that employees use a key-generating app...
Question 79: A senior incident response manager receives a call about som...
Question 80: An organization's internal auditor discovers that large sums...
Question 81: A Chief Information Officer (CIO) drafts an agreement betwee...
Question 82: A user suspects someone has been accessing a home network wi...
Question 83: A security engineer is configuring a wireless network that m...
Question 84: A manager wants to distribute a report to several other mana...
Question 85: Which of the following security controls does an iris scanne...
Question 86: An incident responder receives a call from a user who report...
Question 87: A Chief Executive Officer (CEO) suspects someone in the lab ...
Question 88: When configuring settings in a mandatory access control envi...
Question 89: When identifying a company's most valuable assets as part of...
Question 90: Which of the following occurs when the security of a web app...
Question 91: In terms of encrypting data, which of the following is BEST ...
Question 92: A company has three divisions, each with its own networks an...
Question 93: Which of the following vulnerability types would the type of...
Question 94: A company's user lockout policy is enabled after five unsucc...
Question 95: A security consultant discovers that an organization is usin...
Question 96: A company hires a consulting firm to crawl its Active Direct...
Question 97: Ann. An employee in the payroll department, has contacted th...