Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 1 out of 13 pages
Viewing questions 1-15 out of questions
Questions # 1:

The security operations center is researching an event concerning a suspicious IP address A security analyst looks at the following event logs and discovers that a significant portion of the user accounts have experienced faded log-In attempts when authenticating from the same IP address:

Question # 1

Which of the following most likely describes attack that took place?

Options:

A.

Spraying


B.

Brute-force


C.

Dictionary


D.

Rainbow table


Expert Solution
Questions # 2:

A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?

Options:

A.

Deploying PowerShell scripts


B.

Pushing GPO update


C.

Enabling PAP


D.

Updating EDR profiles


Expert Solution
Questions # 3:

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?

Options:

A.

Order of volatility


B.

Preservation of event logs


C.

Chain of custody


D.

Compliance with legal hold


Expert Solution
Questions # 4:

Which of the following would a systems administrator follow when upgrading the firmware of an organization's router?

Options:

A.

Software development life cycle


B.

Risk tolerance


C.

Certificate signing request


D.

Maintenance window


Expert Solution
Questions # 5:

An external vendor recently visited a company's headquarters tor a presentation. Following the visit a member of the hosting team found a file that the external vendor left behind on a server. The file contained detailed architecture information and code snippets. Which of the following data types best describes this file?

Options:

A.

Government


B.

Public


C.

Proprietary


D.

Critical


Expert Solution
Questions # 6:

A security team receives reports about high latency and complete network unavailability throughout most of the office building. Flow logs from the campus switches show high traffic on TCP 445. Which of the following is most likely the root cause of this incident?

Options:

A.

Buffer overflow


B.

NTP amplification attack


C.

Worm


D.

Kerberoasting attack


Expert Solution
Questions # 7:

A systems administrator wants to use a technical solution to explicitly define file permissions for the entire team. Which of the following should the administrator implement?

Options:

A.

ACL


B.

Monitoring


C.

Isolation


D.

HIPS


Expert Solution
Questions # 8:

Which of the following actors attacking an organization is the most likely to be motivated by personal beliefs?

Options:

A.

Nation-state


B.

Organized crime


C.

Hacktvist


D.

Insider threat


Expert Solution
Questions # 9:

A systems administrator needs to provide traveling employees with a tool that will protect company devices regardless of where they are working. Which of the following should the administrator implement?

Options:

A.

Isolation


B.

Segmentation


C.

ACL


D.

HIPS


Expert Solution
Questions # 10:

The security team at a large global company needs to reduce the cost of storing data used for performing investigations. Which of the following types of data should have its retention length reduced?

Options:

A.

Packet capture


B.

Endpoint logs


C.

OS security logs


D.

Vulnerability scan


Expert Solution
Questions # 11:

A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?

Options:

A.

Enumeration


B.

Sanitization


C.

Destruction


D.

Inventory


Expert Solution
Questions # 12:

A security manager is implementing MFA and patch management. Which of the following would best describe the control type and category? (Select two).

Options:

A.

Physical


B.

Managerial


C.

Detective


D.

Administrator


E.

Preventative


F.

Technical


Expert Solution
Questions # 13:

A security analyst is examining a penetration test report and notices that the tester pivoted to critical internal systems with the same local user ID and password. Which of the following would help prevent this in the future?

Options:

A.

Implement centralized authentication with proper password policies


B.

Add password complexity rules and increase password history limits


C.

Connect the systems to an external authentication server


D.

Limit the ability of user accounts to change passwords


Expert Solution
Questions # 14:

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?

Options:

A.

Multifactor authentication


B.

Permissions assignment


C.

Access management


D.

Password complexity


Expert Solution
Questions # 15:

A network administrator wants to ensure that network traffic is highly secure while in transit. Which of the following actions best describes the actions the network administrator should take?

Options:

A.

Ensure that NAC is enforced on all network segments, and confirm that firewalls have updated policies to block unauthorized traffic.


B.

Ensure only TLS and other encrypted protocols are selected for use on the network, and only permit authorized traffic via secure protocols.


C.

Configure the perimeter IPS to block inbound HTTPS directory traversal traffic, and verify that signatures are updated on a daily basis.


D.

Ensure the EDR software monitors for unauthorized applications that could be used by threat actors, and configure alerts for the security team.


Expert Solution
Viewing page 1 out of 13 pages
Viewing questions 1-15 out of questions