Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions
Questions # 1:

A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?

Options:

A.

To reduce implementation cost


B.

To identify complexity


C.

To remediate technical debt


D.

To prevent a single point of failure


Expert Solution
Questions # 2:

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

INSTRUCTIONS

Not all attacks and remediation actions will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 2


Expert Solution
Questions # 3:

Which of the following describes the reason for using an MDM solution to prevent jailbreaking?

Options:

A.

To secure end-of-life devices from incompatible firmware updates


B.

To avoid hypervisor attacks through VM escape


C.

To eliminate buffer overflows at the application layer


D.

To prevent users from changing the OS of mobile devices


Expert Solution
Questions # 4:

A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?

Options:

A.

IPS


B.

Firewall


C.

ACL


D.

Windows security


Expert Solution
Questions # 5:

An engineer moved to another team and is unable to access the new team's shared folders while still being able to access the shared folders from the former team. After opening a ticket, the engineer discovers that the account was never moved to the new group. Which of the following access controls is most likely causing the lack of access? 1  

Options:

A.

Role-based


B.

Discretionary


C.

Time of day


D.

Least privilege


Expert Solution
Questions # 6:

An organization failed to account for the right-to-be-forgotten regulations. Which of the following impacts might this action have on the company?

Options:

A.

Fines


B.

Data breaches


C.

Revenue loss


D.

Blackmail


Expert Solution
Questions # 7:

Which of the following actions would reduce the number of false positives for an analyst to manually review?

Options:

A.

Create playbooks as part of a SOAR platform


B.

Redefine the patch management process


C.

Replace an EDR tool with an XDR solution


D.

Disable AV heuristics scanning


Expert Solution
Questions # 8:

Which of the following makes Infrastructure as Code (IaC) a preferred security architecture over traditional infrastructure models?

Options:

A.

Common attacks are less likely to be effective.


B.

Configuration can be better managed and replicated.


C.

Outsourcing to a third party with more expertise in network defense is possible.


D.

Optimization can occur across a number of computing instances.


Expert Solution
Questions # 9:

A security administrator needs to reduce the attack surface in the company's data centers. Which of the following should the security administrator do to complete this task?

Options:

A.

Implement a honeynet.


B.

Define Group Policy on the servers.


C.

Configure the servers for high availability.


D.

Upgrade end-of-support operating systems.


Expert Solution
Questions # 10:

Which of the following prevents unauthorized modifications to internal processes, assets, and security controls?

Options:

A.

Change management


B.

Playbooks


C.

Incident response


D.

Acceptable use policy


Expert Solution
Questions # 11:

A security analyst is reviewing logs and discovers the following:

Question # 11

Which of the following should be used lo best mitigate this type of attack?

Options:

A.

Input sanitization


B.

Secure cookies


C.

Static code analysis


D.

Sandboxing


Expert Solution
Questions # 12:

Which of the following describes the process of concealing code or text inside a graphical image?

Options:

A.

Symmetric encryption


B.

Hashing


C.

Data masking


D.

Steganography


Expert Solution
Questions # 13:

Which of the following should be used to select a label for a file based on the file's value, sensitivity, or applicable regulations?

Options:

A.

Verification


B.

Certification


C.

Classification


D.

Inventory


Expert Solution
Questions # 14:

A security engineer is installing an IPS to block signature-based attacks in the environment. Which of the following modes will best accomplish this task?

Options:

A.

Monitor


B.

Sensor


C.

Audit


D.

Active


Expert Solution
Questions # 15:

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?

Options:

A.

Key stretching


B.

Data masking


C.

Steganography


D.

Salting


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions