Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 12 out of 12 pages
Viewing questions 166-180 out of questions
Questions # 166:

Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?

Options:

A.

Jailbreaking


B.

Memory injection


C.

Resource reuse


D.

Side loading


Expert Solution
Questions # 167:

A user is attempting to patch a critical system, but the patch fails to transfer. Which of the following access controls is most likely inhibiting the transfer?

Options:

A.

Attribute-based


B.

Time of day


C.

Role-based


D.

Least privilege


Expert Solution
Questions # 168:

Which of the following explains why an attacker cannot easily decrypt passwords using a rainbow table attack?

Options:

A.

Digital signatures


B.

Salting


C.

Hashing


D.

Perfect forward secrecy


Expert Solution
Questions # 169:

A security analyst is reviewing the following logs:

Question # 169

Which of the following attacks is most likely occurring?

Options:

A.

Password spraying


B.

Account forgery


C.

Pass-t he-hash


D.

Brute-force


Expert Solution
Questions # 170:

A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?

Options:

A.

Threshold


B.

Appetite


C.

Avoidance


D.

Register


Expert Solution
Questions # 171:

Which of the following would be the best ways to ensure only authorized personnel can access a secure facility? (Select two).

Options:

A.

Fencing


B.

Video surveillance


C.

Badge access


D.

Access control vestibule


E.

Sign-in sheet


F.

Sensor


Expert Solution
Viewing page 12 out of 12 pages
Viewing questions 166-180 out of questions