New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions
Questions # 1:

The security team notices that the Always On VPN solution sometimes fails to connect. This leaves remote users unprotected because they cannot connect to the on-premises web proxy. Which of the following changes will best provide web protection in this scenario?

Options:

A.

Implement network access control.


B.

Configure the local gateway to point to the VPN.


C.

Create a public NAT to the on-premises proxy.


D.

Install a host-based content filtering solution.


Expert Solution
Questions # 2:

A recent black-box penetration test of http://example.com discovered that external

website vulnerabilities exist, such as directory traversals, cross-site scripting, cross-site forgery, and insecure protocols.

You are tasked with reducing the attack space and enabling secure protocols.

INSTRUCTIONS

Part 1

Use the drop-down menus to select the appropriate technologies for each location to implement a secure and resilient web architecture. Not all technologies will be used, and technologies may be used multiple times.

Part 2

Use the drop-down menus to select the appropriate command snippets from the drop-down menus. Each command section must be filled.

Question # 2

Question # 2

Question # 2

Question # 2


Expert Solution
Questions # 3:

Which of the following best describe the benefits of a microservices architecture when compared to a monolithic architecture? (Select two).

Options:

A.

Easter debugging of the system


B.

Reduced cost of ownership of the system


C.

Improved scalability of the system


D.

Increased compartmentalization of the system


E.

Stronger authentication of the system


F.

Reduced complexity of the system


Expert Solution
Questions # 4:

A financial institution would like to store its customer data m the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

Options:

A.

Asymmetric


B.

Symmetric


C.

Homomorphic


D.

Ephemeral


Expert Solution
Questions # 5:

A company is currently utilizing usernames and passwords, and it wants to integrate an MFA method that is seamless, can Integrate easily into a user's workflow, and can utilize employee-owned devices. Which of the following will meet these requirements?

Options:

A.

Push notifications


B.

Phone call


C.

Smart card


D.

Offline backup codes


Expert Solution
Questions # 6:

A systems administrator needs to ensure the secure communication of sensitive data within the organization's private cloud. Which of the following is the best choice for the administrator to implement?

Options:

A.

IPSec


B.

SHA-1


C.

RSA


D.

TGT


Expert Solution
Questions # 7:

An MSSP manages firewalls for hundreds of clients. Which of the following tools would be most helpful to create a standard configuration template in order to improve the efficiency of firewall changes?

Options:

A.

SNMP


B.

Benchmarks


C.

Netflow


D.

SCAP


Expert Solution
Questions # 8:

Which of the following is an example of a data protection strategy that uses tokenization?

Options:

A.

Encrypting databases containing sensitive data


B.

Replacing sensitive data with surrogate values


C.

Removing sensitive data from production systems


D.

Hashing sensitive data in critical systems


Expert Solution
Questions # 9:

Which of the following is the best reason to perform a tabletop exercise?

Options:

A.

To address audit findings


B.

To collect remediation response times


C.

To update the IRP


D.

To calculate the ROI


Expert Solution
Questions # 10:

An organization wants to improve the company's security authentication method for remote employees. Given the following requirements:

• Must work across SaaS and internal network applications

• Must be device manufacturer agnostic

• Must have offline capabilities

Which of the following would be the most appropriate authentication method?

Options:

A.

Username and password


B.

Biometrics


C.

SMS verification


D.

Time-based tokens


Expert Solution
Questions # 11:

When trying to access an internal website, an employee reports that a prompt displays, stating that the site is insecure. Which of the following certificate types is the site most likely using?

Options:

A.

Wildcard


B.

Root of trust


C.

Third-party


D.

Self-signed


Expert Solution
Questions # 12:

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

Options:

A.

To gather loCs for the investigation


B.

To discover which systems have been affected


C.

To eradicate any trace of malware on the network


D.

To prevent future incidents of the same nature


Expert Solution
Questions # 13:

A customer of a large company receives a phone call from someone claiming to work for the company and asking for the customer's credit card information. The customer sees the caller ID is the same as the company's main phone number. Which of the following attacks is the customer most likely a target of?

Options:

A.

Phishing


B.

Whaling


C.

Smishing


D.

Vishing


Expert Solution
Questions # 14:

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

Options:

A.

Compensating control


B.

Network segmentation


C.

Transfer of risk


D.

SNMP traps


Expert Solution
Questions # 15:

A website user is locked out of an account after clicking an email link and visiting a different website Web server logs show the user's password was changed, even though the user did not change the password. Which of the following is the most likely cause?

Options:

A.

Cross-sue request forgery


B.

Directory traversal


C.

ARP poisoning


D.

SQL injection


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions