Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 1 out of 16 pages
Viewing questions 1-15 out of questions
Questions # 1:

Which security controls is a company implementing by deploying HIPS? (Select two)

Options:

A.

Directive


B.

Preventive


C.

Physical


D.

Corrective


E.

Compensating


F.

Detective


Expert Solution
Questions # 2:

A Chief Information Security Officer (CISO) has developed information security policies that relate to the software development methodology. Which of the following would the CISO most likely include in the organization's documentation?

Options:

A.

Peer review requirements


B.

Multifactor authentication


C.

Branch protection tests


D.

Secrets management configurations


Expert Solution
Questions # 3:

Which of the following should be deployed on an externally facing web server in order to establish an encrypted connection?

Options:

A.

Public key


B.

Private Key


C.

Asymmetric key


D.

Symmetric key


Expert Solution
Questions # 4:

A company evaluates several options that would allow employees to have remote access to the network. The security team wants to ensure the solution includes AAA to comply with internal security policies. Which of the following should the security team recommend?

Options:

A.

IPSec with RADIUS


B.

RDP connection with LDAPS


C.

Web proxy for all remote traffic


D.

Jump server with 802.1X


Expert Solution
Questions # 5:

A security administrator protects passwords by using hashing. Which of the following best describes what the administrator is doing?

Options:

A.

Adding extra characters at the end to increase password length


B.

Generating a token to make the passwords temporal


C.

Using mathematical algorithms to make passwords unique


D.

Creating a rainbow table to protect passwords in a list


Expert Solution
Questions # 6:

A security analyst estimates that a small security incident will cost $10,000 and will occur twice per year. The analyst recommends a budget of $20,000 for next year. Which of the following does the $10,000 represent?

Options:

A.

ARO


B.

SLE


C.

ALE


D.

RPO


Expert Solution
Questions # 7:

A company asks a vendor to help its internal red team with a penetration test without providing too much detail about the infrastructure. Which of the following penetration testing methods does this scenario describe?

Options:

A.

Passive reconnaissance


B.

Partially-known environment


C.

Integrated testing


D.

Defensive testing


Expert Solution
Questions # 8:

A Chief Security Officer signs off on a request to allow inbound SMB and RDP from the internet to a single VLAN. Which of the following is the most likely explanation for this activity?

Options:

A.

The company built a new file-sharing site.


B.

The organization is preparing for a penetration test.


C.

The security team is integrating with an SASE platform.


D.

The security team created a honeynet.


Expert Solution
Questions # 9:

Which of the following should be used to prevent changes to system-level data?

Options:

A.

NIDS


B.

DLP


C.

NAC


D.

FIM


Expert Solution
Questions # 10:

An organization experiences a compromise in a cloud-hosted solution that contains customer information. Which of the following strategies will help determine the sensitivity level of the breach?

Options:

A.

Permission restrictions


B.

Tabletop exercise


C.

Data classification


D.

Asset inventory


Expert Solution
Questions # 11:

Which of the following actions would reduce the number of false positives for an analyst to manually review?

Options:

A.

Create playbooks as part of a SOAR platform


B.

Redefine the patch management process


C.

Replace an EDR tool with an XDR solution


D.

Disable AV heuristics scanning


Expert Solution
Questions # 12:

A systems administrator needs to provide traveling employees with a tool that will protect company devices regardless of where they are working. Which of the following should the administrator implement?

Options:

A.

Isolation


B.

Segmentation


C.

ACL


D.

HIPS


Expert Solution
Questions # 13:

A user downloads a patch from an unknown repository… FIM alerts indicate OS file hashes have changed. Which attack most likely occurred?

Options:

A.

Logic bomb


B.

Keylogger


C.

Ransomware


D.

Rootkit


Expert Solution
Questions # 14:

Which of the following is the best way to prevent data from being leaked from a secure network that does not need to communicate externally?

Options:

A.

Air gap


B.

Containerization


C.

Virtualization


D.

Decentralization


Expert Solution
Questions # 15:

A software developer wishes to implement an application security technique that will provide assurance of the application's integrity. Which of the following techniques will achieve this?

Options:

A.

Secure cookies


B.

Input validation


C.

Static analysis


D.

Code signing


Expert Solution
Viewing page 1 out of 16 pages
Viewing questions 1-15 out of questions