Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 11 out of 12 pages
Viewing questions 151-165 out of questions
Questions # 151:

An organization recently updated its security policy to include the following statement:

Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and ? from variables set by forms in a web application.

Which of the following best explains the security technique the organization adopted by making this addition to the policy?

Options:

A.

Identify embedded keys


B.

Code debugging


C.

Input validation


D.

Static code analysis


Expert Solution
Questions # 152:

A systems administrator is auditing all company servers to ensure. They meet the minimum security baseline While auditing a Linux server, the systems administrator observes the /etc/shadow file has permissions beyond the baseline recommendation. Which of the following commands should the systems administrator use to resolve this issue?

Options:

A.

chmod


B.

grep


C.

dd


D.

passwd


Expert Solution
Questions # 153:

Visitors to a secured facility are required to check in with a photo ID and enter the facility through an access control vestibule Which of the following but describes this form of security control?

Options:

A.

Physical


B.

Managerial


C.

Technical


D.

Operational


Expert Solution
Questions # 154:

A security analyst receives an alert that there was an attempt to download known malware. Which of the following actions would allow the best chance to analyze the malware?

Options:

A.

Review the IPS logs and determine which command-and-control IPs were blocked.


B.

Analyze application logs to see how the malware attempted to maintain persistence.


C.

Run vulnerability scans to check for systems and applications that are vulnerable to the malware.


D.

Obtain and execute the malware in a sandbox environment and perform packet captures.


Expert Solution
Questions # 155:

Two companies are in the process of merging. The companies need to decide how to standardize their information security programs. Which of the following would best align the security programs?

Options:

A.

Shared deployment of CIS baselines


B.

Joint cybersecurity best practices


C.

Both companies following the same CSF


D.

Assessment of controls in a vulnerability report


Expert Solution
Questions # 156:

Which of the following is a primary security concern for a company setting up a BYOD program?

Options:

A.

End of life


B.

Buffer overflow


C.

VM escape


D.

Jailbreaking


Expert Solution
Questions # 157:

A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the file's creator. Which of the following actions would most likely give the security analyst the information required?

Options:

A.

Obtain the file's SHA-256 hash.


B.

Use hexdump on the file's contents.


C.

Check endpoint logs.


D.

Query the file's metadata.


Expert Solution
Questions # 158:

The Chief Information Security Officer of an organization needs to ensure recovery from ransomware would likely occur within the organization's agreed-upon RPOs end RTOs. Which of the following backup scenarios would best ensure recovery?

Options:

A.

Hourly differential backups stored on a local SAN array


B.

Dally full backups stored on premises in magnetic offline media


C.

Daly differential backups maintained by a third-party cloud provider


D.

Weekly full backups with daily incremental stored on a NAS drive


Expert Solution
Questions # 159:

A security analyst is prioritizing vulnerability scan results using a risk-based approach. Which of the following is the most efficient resource for the analyst to use?

Options:

A.

Business impact analysis


B.

Common Vulnerability Scoring System


C.

Risk register


D.

Exposure factor


Expert Solution
Questions # 160:

Which of the following is the first step to take when creating an anomaly detection process?

Options:

A.

Selecting events


B.

Building a baseline


C.

Selecting logging options


D.

Creating an event log


Expert Solution
Questions # 161:

The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?

Options:

A.

Hot site


B.

Cold site


C.

Failover site


D.

Warm site


Expert Solution
Questions # 162:

A security analyst is reviewing the security of a SaaS application that the company intends to purchase. Which of the following documentations should the security analyst request from the SaaS application vendor?

Options:

A.

Service-level agreement


B.

Third-party audit


C.

Statement of work


D.

Data privacy agreement


Expert Solution
Questions # 163:

Which of the following best explains a concern with OS-based vulnerabilities?

Options:

A.

An exploit would give an attacker access to system functions that span multiple applications.


B.

The OS vendor's patch cycle is not frequent enough to mitigate the large number of threats.


C.

Most users trust the core operating system features and may not notice if the system has been compromised.


D.

Exploitation of an operating system vulnerability is typically easier than any other vulnerability.


Expert Solution
Questions # 164:

A company's accounts payable clerk receives a message from a vendor asking to change their bank account before paying an invoice. The clerk makes the change and sends the payment to the new account. Days later, the clerk receives another message from the same vendor with a request for a missing payment to the original bank account. Which of the following has most likely occurred?

Options:

A.

Phishing campaign


B.

Data exfiltration


C.

Pretext calling


D.

Business email compromise


Expert Solution
Questions # 165:

A penetration test identifies that an SMBvl Is enabled on multiple servers across an organization. The organization wants to remediate this vulnerability in the most efficient way possible. Which of the following should the organization use for this purpose?

Options:

A.

GPO


B.

ACL


C.

SFTP


D.

DLP


Expert Solution
Viewing page 11 out of 12 pages
Viewing questions 151-165 out of questions