Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 10 out of 13 pages
Viewing questions 136-150 out of questions
Questions # 136:

A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the following should be configured on the existing network infrastructure to best prevent this activity?

Options:

A.

Port security


B.

Web application firewall


C.

Transport layer security


D.

Virtual private network


Expert Solution
Questions # 137:

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks.

Which of the following analysis elements did the company most likely use in making this decision?

Options:

A.

IMTTR


B.

RTO


C.

ARO


D.

MTBF


Expert Solution
Questions # 138:

A company's accounts payable clerk receives a message from a vendor asking to change their bank account before paying an invoice. The clerk makes the change and sends the payment to the new account. Days later, the clerk receives another message from the same vendor with a request for a missing payment to the original bank account. Which of the following has most likely occurred?

Options:

A.

Phishing campaign


B.

Data exfiltration


C.

Pretext calling


D.

Business email compromise


Expert Solution
Questions # 139:

An organization would like to store customer data on a separate part of the network that is not accessible to users on the main corporate network. Which of the following should the administrator use to accomplish this goal?

Options:

A.

Segmentation


B.

Isolation


C.

Patching


D.

Encryption


Expert Solution
Questions # 140:

A security consultant needs secure, remote access to a client environment. Which of the following should the security consultant most likely use to gain access?

Options:

A.

EAP


B.

DHCP


C.

IPSec


D.

NAT


Expert Solution
Questions # 141:

Which of the following data recovery strategies will result in a quick recovery at low cost?

Options:

A.

Hot


B.

Cold


C.

Manual


D.

Warm


Expert Solution
Questions # 142:

Which of the following would be the best ways to ensure only authorized personnel can access a secure facility? (Select two).

Options:

A.

Fencing


B.

Video surveillance


C.

Badge access


D.

Access control vestibule


E.

Sign-in sheet


F.

Sensor


Expert Solution
Questions # 143:

The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?

Options:

A.

Hot site


B.

Cold site


C.

Failover site


D.

Warm site


Expert Solution
Questions # 144:

A legal department must maintain a backup from all devices that have been shredded and recycled by a third party. Which of the following best describes this requirement?

Options:

A.

Data retention


B.

Certification


C.

Sanitation


D.

Destruction


Expert Solution
Questions # 145:

A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Select two).

Options:

A.

Key escrow


B.

TPM presence


C.

Digital signatures


D.

Data tokenization


E.

Public key management


F.

Certificate authority linking


Expert Solution
Questions # 146:

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company's reliance on open-source libraries?

Options:

A.

Buffer overflow


B.

SQL injection


C.

Cross-site scripting


D.

Zero day


Expert Solution
Questions # 147:

A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?

Options:

A.

Insurance


B.

Patching


C.

Segmentation


D.

Replacement


Expert Solution
Questions # 148:

A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

Options:

A.

Implementing encryption


B.

Monitoring outbound traffic


C.

Using default settings


D.

Closing all open ports


Expert Solution
Questions # 149:

An administrator is Investigating an incident and discovers several users’ computers were Infected with malware after viewing files mat were shared with them. The administrator discovers no degraded performance in the infected machines and an examination of the log files does not show excessive failed logins. Which of the following attacks Is most likely the cause of the malware?

Options:

A.

Malicious flash drive


B.

Remote access Trojan


C.

Brute-forced password


D.

Cryptojacking


Expert Solution
Questions # 150:

A company's website is www. Company. com Attackers purchased the domain wwww. company.com Which of the following types of attacks describes this example?

Options:

A.

Typosquatting


B.

Brand Impersonation


C.

On-path


D.

Watering-hole


Expert Solution
Viewing page 10 out of 13 pages
Viewing questions 136-150 out of questions