Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions
Questions # 1:

A security team wants WAF policies to be automatically created when applications are deployed. Which concept describes this capability?

Options:

A.

IaC


B.

IoT


C.

IoC


D.

IaaS


Expert Solution
Questions # 2:

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

Options:

A.

Bluetooth


B.

Wired


C.

NFC


D.

SCADA


Expert Solution
Questions # 3:

A security analyst is reviewing logs and discovers the following:

Question # 3

Which of the following should be used lo best mitigate this type of attack?

Options:

A.

Input sanitization


B.

Secure cookies


C.

Static code analysis


D.

Sandboxing


Expert Solution
Questions # 4:

A company has a website in a server cluster. One server is experiencing very high usage, while others are nearly unused. Which of the following should the company configure to help distribute traffic quickly?

Options:

A.

Server multiprocessing


B.

Warm site


C.

Load balancer


D.

Proxy server


Expert Solution
Questions # 5:

Which of the following technologies assists in passively verifying the expired status of a digital certificate?

Options:

A.

OCSP


B.

CRL


C.

TPM


D.

CSR


Expert Solution
Questions # 6:

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company's reliance on open-source libraries?

Options:

A.

Buffer overflow


B.

SQL injection


C.

Cross-site scripting


D.

Zero day


Expert Solution
Questions # 7:

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Options:

A.

Disaster recovery plan


B.

Incident response procedure


C.

Business continuity plan


D.

Change management procedure


Expert Solution
Questions # 8:

A systems administrator wants to use a technical solution to explicitly define file permissions for the entire team. Which of the following should the administrator implement?

Options:

A.

ACL


B.

Monitoring


C.

Isolation


D.

HIPS


Expert Solution
Questions # 9:

An attorney prints confidential documents to a copier in an office space near multiple workstations and a reception desk. When the attorney goes to the copier to retrieve the documents, the documents are missing. Which of the following would best prevent this from reoccurring?

Options:

A.

Place the copier in the legal department.


B.

Configure DLP on the attorney's workstation.


C.

Set up LDAP authentication on the printer.


D.

Conduct a physical penetration test.


Expert Solution
Questions # 10:

A few weeks after deploying additional email servers, employees complain that messages are being marked as spam. Which needs to be updated?

Options:

A.

CNAME


B.

SMTP


C.

DLP


D.

SPF


Expert Solution
Questions # 11:

Which of the following agreement types defines the time frame in which a vendor needs to respond?

Options:

A.

SOW


B.

SLA


C.

MOA


D.

MOU


Expert Solution
Questions # 12:

An employee from the accounting department logs in to the website used for processing the company's payments. After logging in, a new desktop application automatically downloads on the employee's computer and causes the computer to restart. Which of the following attacks has occurred?

Options:

A.

XSS


B.

Watering hole


C.

Typosquatting


D.

Buffer overflow


Expert Solution
Questions # 13:

Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?

Options:

A.

TPM


B.

ECC


C.

FDE


D.

HSM


Expert Solution
Questions # 14:

Which of the following threat actors would most likely target an organization by using a logic bomb within an internally-developed application?

Options:

A.

Nation-state


B.

Trusted insider


C.

Organized crime group


D.

Hacktivist


Expert Solution
Questions # 15:

Which of the following best describe why a process would require a two-person integrity security control?

Options:

A.

To Increase the chance that the activity will be completed in half of the time the process would take only one user to complete


B.

To permit two users from another department to observe the activity that is being performed by an authorized user


C.

To reduce the risk that the procedures are performed incorrectly or by an unauthorized user


D.

To allow one person to perform the activity while being recorded on the CCTV camera


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions