Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 10 out of 12 pages
Viewing questions 136-150 out of questions
Questions # 136:

Which of the following is the best way to improve the confidentiality of remote connections to an enterprise's infrastructure?

Options:

A.

Firewalls


B.

Virtual private networks


C.

Extensive logging


D.

Intrusion detection systems


Expert Solution
Questions # 137:

Which of the following should a company use to provide proof of external network security testing?

Options:

A.

Business impact analysis


B.

Supply chain analysis


C.

Vulnerability assessment


D.

Third-party attestation


Expert Solution
Questions # 138:

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

Options:

A.

Insider


B.

Unskilled attacker


C.

Nation-state


D.

Hacktivist


Expert Solution
Questions # 139:

An organization needs to monitor its users' activities to prevent insider threats. Which of the following solutions would help the organization achieve this goal?

Options:

A.

Behavioral analytics


B.

Access control lists


C.

Identity and access management


D.

Network intrusion detection system


Expert Solution
Questions # 140:

The physical security team at a company receives reports that employees are not displaying their badges. The team also observes employees tailgating at controlled entrances. Which of the following topics will the security team most likely emphasize in upcoming security training?

Options:

A.

Social engineering


B.

Situational awareness


C.

Phishing


D.

Acceptable use policy


Expert Solution
Questions # 141:

A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?

Options:

A.

A thorough analysis of the supply chain


B.

A legally enforceable corporate acquisition policy


C.

A right to audit clause in vendor contracts and SOWs


D.

An in-depth penetration test of all suppliers and vendors


Expert Solution
Questions # 142:

Which of the following security controls are a company implementing by deploying HIPS? (Select two).

Options:

A.

Directive


B.

Preventive


C.

Physical


D.

Corrective


E.

Compensating


F.

Detective


Expert Solution
Questions # 143:

Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Options:

A.

Client


B.

Third-party vendor


C.

Cloud provider


D.

DBA


Expert Solution
Questions # 144:

A legal department must maintain a backup from all devices that have been shredded and recycled by a third party. Which of the following best describes this requirement?

Options:

A.

Data retention


B.

Certification


C.

Sanitation


D.

Destruction


Expert Solution
Questions # 145:

A company is changing its mobile device policy. The company has the following requirements:

Company-owned devices

Ability to harden the devices

Reduced security risk

Compatibility with company resources

Which of the following would best meet these requirements?

Options:

A.

BYOD


B.

CYOD


C.

COPE


D.

COBO


Expert Solution
Questions # 146:

Which of the following tasks is typically included in the BIA process?

Options:

A.

Estimating the recovery time of systems


B.

Identifying the communication strategy


C.

Evaluating the risk management plan


D.

Establishing the backup and recovery procedures


E.

Developing the incident response plan


Expert Solution
Questions # 147:

A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?

Options:

A.

Hashing


B.

Tokenization


C.

Encryption


D.

Segmentation


Expert Solution
Questions # 148:

A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?

Options:

A.

Serverless framework


B.

Type 1 hvpervisor


C.

SD-WAN


D.

SDN


Expert Solution
Questions # 149:

A business provides long-term cold storage services to banks that are required to follow regulator-imposed data retention guidelines. Banks that use these services require that data is disposed of in a specific manner at the conclusion of the regulatory threshold for data retention. Which of the following aspects of data management is the most important to the bank in the destruction of this data?

Options:

A.

Encryption


B.

Classification


C.

Certification


D.

Procurement


Expert Solution
Questions # 150:

Which of the following data protection strategies can be used to confirm file integrity?

Options:

A.

Masking


B.

Encryption


C.

Hashing


D.

Obfuscation


Expert Solution
Viewing page 10 out of 12 pages
Viewing questions 136-150 out of questions