Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 1 out of 17 pages
Viewing questions 1-15 out of questions
Questions # 1:

A company is adding a clause to its AUP that states employees are not allowed to modify the operating system on mobile devices. Which of the following vulnerabilities is the organization addressing?

Options:

A.

Cross-site scripting


B.

Buffer overflow


C.

Jailbreaking


D.

Side loading


Expert Solution
Questions # 2:

You are security administrator investigating a potential infection on a network.

Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.

Question # 2

Question # 2

Question # 2

Question # 2

Question # 2

Question # 2

Question # 2


Expert Solution
Questions # 3:

Which of the following would most likely be used by attackers to perform credential harvesting?

Options:

A.

Social engineering


B.

Supply chain compromise


C.

Third-party software


D.

Rainbow table


Expert Solution
Questions # 4:

Several customers want an organization to verify its security controls are operating effectively and have requested an independent opinion. Which of the following is the most efficient way to address these requests?

Options:

A.

Hire a vendor to perform a penetration test.


B.

Perform an annual self-assessment.


C.

Allow each client the right to audit.


D.

Provide a third-party attestation report.


Expert Solution
Questions # 5:

Which of the following best explains the use of a policy engine in a Zero Trust environment?

Options:

A.

It is used by a central server to apply default permissions across a range of network and computing resources.


B.

It is used to make access control decisions without inheriting permission decisions from prior events.


C.

It is used to dynamically assign user permissions based on a user ' s identity and previous activity.


D.

It is used when user roles are unknown and the organization wants to leverage ML to control access.


Expert Solution
Questions # 6:

A security manager is implementing MFA and patch management. Which of the following would best describe the control type and category? (Select two).

Options:

A.

Physical


B.

Managerial


C.

Detective


D.

Administrator


E.

Preventative


F.

Technical


Expert Solution
Questions # 7:

A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?

Options:

A.

Serverless architecture


B.

Thin clients


C.

Private cloud


D.

Virtual machines


Expert Solution
Questions # 8:

The Chief Information Security Officer gives the security community the opportunity to report vulnerabilities on the organization’s public-facing assets. Which of the following does this scenario best describe?

Options:

A.

Bug bounty


B.

Red teaming


C.

Open-source intelligence


D.

Third-party information sharing


Expert Solution
Questions # 9:

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

Options:

A.

VM escape


B.

SQL injection


C.

Buffer overflow


D.

Race condition


Expert Solution
Questions # 10:

Which of the following is a benefit of vendor diversity?

Options:

A.

Patch availability


B.

Zero-day resiliency


C.

Secure configuration guide applicability


D.

Load balancing


Expert Solution
Questions # 11:

Which of the following is a benefit of launching a bug bounty program? (Select two)

Options:

A.

Transference of risk to a third party


B.

Reduction in the number of zero-day vulnerabilities


C.

Increased security awareness for the workforce


D.

Reduced cost of managing the program


E.

Quicker discovery of vulnerabilities


F.

Improved patch management process


Expert Solution
Questions # 12:

An IT security team is concerned about the confidentiality of documents left unattended in MFPs. Which of the following should the security team do to mitigate the situation?

Options:

A.

Educate users about the importance of paper shredder devices.


B.

Deploy an authentication factor that requires ln-person action before printing.


C.

Install a software client m every computer authorized to use the MFPs.


D.

Update the management software to utilize encryption.


Expert Solution
Questions # 13:

An administrator is estimating the cost associated with an attack that could result in the replacement of a physical server. Which of the following processes is the administrator performing?

Options:

A.

Quantitative risk analysis


B.

Disaster recovery test


C.

Physical security controls review


D.

Threat modeling


Expert Solution
Questions # 14:

An accounting clerk sent money to an attacker ' s bank account after receiving fraudulent instructions over the phone to use a new account. Which of the following would most likely prevent this activity in the future?

Options:

A.

Standardizing security incident reporting


B.

Executing regular phishing campaigns


C.

Implementing insider threat detection measures


D.

Updating processes for sending wire transfers


Expert Solution
Questions # 15:

Which of the following allows an exploit to go undetected by the operating system?

Options:

A.

Firmware vulnerabilities


B.

Side loading


C.

Memory injection


D.

Encrypted payloads


Expert Solution
Viewing page 1 out of 17 pages
Viewing questions 1-15 out of questions