Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

A security administrator recently reset local passwords and the following values were recorded in the system:

Question # 1

Which of the following in the security administrator most likely protecting against?

Options:

A.

Account sharing


B.

Weak password complexity


C.

Pass-the-hash attacks


D.

Password compromise


Questions # 2:

An engineer has ensured that the switches are using the latest OS, the servers have the latest patches, and the endpoints' definitions are up to date. Which of the following will these actions most effectively prevent?

Options:

A.

Zero-day attacks


B.

Insider threats


C.

End-of-life support


D.

Known exploits


Questions # 3:

Which of the following is prevented by proper data sanitization?

Options:

A.

Hackers' ability to obtain data from used hard drives


B.

Devices reaching end-of-life and losing support


C.

Disclosure of sensitive data through incorrect classification


D.

Incorrect inventory data leading to a laptop shortage


Questions # 4:

A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?

Options:

A.

Validate the code signature.


B.

Execute the code in a sandbox.


C.

Search the executable for ASCII strings.


D.

Generate a hash of the files.


Questions # 5:

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

Options:

A.

Change management ticketing system


B.

Behavioral analyzer


C.

Collaboration platform


D.

Version control tool


Questions # 6:

Which of the following describes the procedures a penetration tester must follow while conducting a test?

Options:

A.

Rules of engagement


B.

Rules of acceptance


C.

Rules of understanding


D.

Rules of execution


Questions # 7:

Which of the following elements of digital forensics should a company use If It needs to ensure the integrity of evidence?

Options:

A.

Preservation


B.

E-discovery


C.

Acquisition


D.

Containment


Questions # 8:

Which of the following would most likely be deployed to obtain and analyze attacker activity and techniques?

Options:

A.

Firewall


B.

IDS


C.

Honeypot


D.

Layer 3 switch


Questions # 9:

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks.

Which of the following analysis elements did the company most likely use in making this decision?

Options:

A.

IMTTR


B.

RTO


C.

ARO


D.

MTBF


Questions # 10:

An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas. The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?

Options:

A.

SSH


B.

SRTP


C.

S/MIME


D.

PPTP


Questions # 11:

A network manager wants to protect the company's VPN by implementing multifactor authentication that uses:

. Something you know

. Something you have

. Something you are

Which of the following would accomplish the manager's goal?

Options:

A.

Domain name, PKI, GeolP lookup


B.

VPN IP address, company ID, facial structure


C.

Password, authentication token, thumbprint


D.

Company URL, TLS certificate, home address


Questions # 12:

A security architect wants to prevent employees from receiving malicious attachments by email. Which of the following functions should the chosen solution do?

Options:

A.

Apply IP address reputation data.


B.

Tap and monitor the email feed.


C.

Scan email traffic inline.


D.

Check SPF records.


Questions # 13:

Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?

Options:

A.

Encryption


B.

Hashing


C.

Masking


D.

Tokenization


Questions # 14:

A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

Options:

A.

SSO


B.

LEAP


C.

MFA


D.

PEAP


Questions # 15:

A company wants to improve the availability of its application with a solution that requires minimal effort in the event a server needs to be replaced or added. Which of the following would be the best solution to meet these objectives?

Options:

A.

Load balancing


B.

Fault tolerance


C.

Proxy servers


D.

Replication


Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions