Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 2 out of 16 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the following could potentially be introduced at the time of side loading?

Options:

A.

User impersonation


B.

Rootkit


C.

On-path attack


D.

Buffer overflow


Expert Solution
Questions # 17:

In which of the following scenarios is tokenization the best privacy technique 10 use?

Options:

A.

Providing pseudo-anonymization tor social media user accounts


B.

Serving as a second factor for authentication requests


C.

Enabling established customers to safely store credit card Information


D.

Masking personal information inside databases by segmenting data


Expert Solution
Questions # 18:

Which of the following scenarios describes a possible business email compromise attack?

Options:

A.

An employee receives a gift card request in an email that has an executive's name in the display field of the email.


B.

Employees who open an email attachment receive messages demanding payment in order to access files.


C.

A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.


D.

An employee receives an email with a link to a phishing site that is designed to look like the company's email portal.


Expert Solution
Questions # 19:

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

Options:

A.

To gather loCs for the investigation


B.

To discover which systems have been affected


C.

To eradicate any trace of malware on the network


D.

To prevent future incidents of the same nature


Expert Solution
Questions # 20:

Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?

Options:

A.

Unidentified removable devices


B.

Default network device credentials


C.

Spear phishing emails


D.

Impersonation of business units through typosquatting


Expert Solution
Questions # 21:

An enterprise security team is researching a new security architecture to better protect the company's networks and applications against the latest cyberthreats. The company has a fully remote workforce. The solution should be highly redundant and enable users to connect to a VPN with an integrated, software-based firewall. Which of the following solutions meets these requirements?

Options:

A.

IPS


B.

SIEM


C.

SASE


D.

CASB


Expert Solution
Questions # 22:

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

Options:

A.

To track the status of patching installations


B.

To find shadow IT cloud deployments


C.

To continuously the monitor hardware inventory


D.

To hunt for active attackers in the network


Expert Solution
Questions # 23:

A group of developers has a shared backup account to access the source code repository. Which of the following is the best way to secure the backup account if there is an SSO failure?

Options:

A.

RAS


B.

EAP


C.

SAML


D.

PAM


Expert Solution
Questions # 24:

Prior to implementing a design change, the change must go through multiple steps to ensure that it does not cause any security issues. Which of the following is most likely to be one of those steps?

Options:

A.

Management review


B.

Load testing


C.

Maintenance notifications


D.

Procedure updates


Expert Solution
Questions # 25:

Which of the following is a vulnerability concern for end-of-life hardware?

Options:

A.

Failure to follow hardware disposal procedures could result in unintended data release.


B.

The supply chain may not have replacement hardware.


C.

Newly released software may require computing resources not available on legacy hardware.


D.

The vendor may stop providing patches and updates.


Expert Solution
Questions # 26:

A business received a small grant to migrate its infrastructure to an off-premises solution. Which of the following should be considered first?

Options:

A.

Security of cloud providers


B.

Cost of implementation


C.

Ability of engineers


D.

Security of architecture


Expert Solution
Questions # 27:

During a recent log review, an analyst discovers evidence of successful injection attacks. Which of the following will best address this issue?

Options:

A.

Authentication


B.

Secure cookies


C.

Static code analysis


D.

Input validation


Expert Solution
Questions # 28:

A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?

Options:

A.

Install endpoint protection


B.

Disable ports/protocols


C.

Change default passwords


D.

Remove unnecessary software


Expert Solution
Questions # 29:

Company A jointly develops a product with Company B, which is located in a different country. Company A finds out that their intellectual property is being shared with unauthorized companies. Which of the following has been breached?

Options:

A.

SLA


B.

AUP


C.

SOW


D.

MOA


Expert Solution
Questions # 30:

Which of the following phases of the incident response process attempts to minimize disruption?

Options:

A.

Recovery


B.

Containment


C.

Preparation


D.

Analysis


Expert Solution
Viewing page 2 out of 16 pages
Viewing questions 16-30 out of questions