New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 2 out of 15 pages
Viewing questions 16-30 out of questions
Questions # 16:

After a series of account compromises and credential misuse, a company hires a security manager to develop a security program. Which of the following steps should the security manager take first to increase security awareness?

Options:

A.

Evaluate tools that identify risky behavior and distribute reports on the findings.


B.

Send quarterly newsletters that explain the importance of password management.


C.

Develop phishing campaigns and notify the management team of any successes.


D.

Update policies and handbooks to ensure all employees are informed of the new procedures.


Expert Solution
Questions # 17:

During a recent log review, an analyst found evidence of successful injection attacks. Which of the following will best address this issue?

Options:

A.

Authentication


B.

Secure cookies


C.

Static code analysis


D.

Input validation


Expert Solution
Questions # 18:

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

Options:

A.

Public key infrastructure


B.

Open public ledger


C.

Public key encryption


D.

Key escrow


Expert Solution
Questions # 19:

A business is expanding to a new country and must protect customers from accidental disclosure of specific national identity information. Which of the following should the security engineer update to best meet business requirements?

Options:

A.

SIEM


B.

SCAP


C.

DLP


D.

WAF


Expert Solution
Questions # 20:

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

Options:

A.

Implementing a bastion host


B.

Deploying a perimeter network


C.

Installing a WAF


D.

Utilizing single sign-on


Expert Solution
Questions # 21:

An administrator wants to perform a risk assessment without using proprietary company information. Which of the following methods should the administrator use to gather information?

Options:

A.

Network scanning


B.

Penetration testing


C.

Open-source intelligence


D.

Configuration auditing


Expert Solution
Questions # 22:

A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?

Options:

A.

Exemption


B.

Exception


C.

Avoid


D.

Transfer


Expert Solution
Questions # 23:

Which of the following would most likely be used by attackers to perform credential harvesting?

Options:

A.

Social engineering


B.

Supply chain compromise


C.

Third-party software


D.

Rainbow table


Expert Solution
Questions # 24:

Which of the following is the most likely motivation for a hacktivist?

Options:

A.

Financial gain


B.

Service disruption


C.

Philosophical beliefs


D.

Corporate espionage


Expert Solution
Questions # 25:

A security analyst is investigating an alert that was produced by endpoint protection software. The analyst determines this event was a false positive triggered by an employee who attempted to download a file. Which of the following is the most likely reason the download was blocked?

Options:

A.

A misconfiguration in the endpoint protection software


B.

A zero-day vulnerability in the file


C.

A supply chain attack on the endpoint protection vendor


D.

Incorrect file permissions


Expert Solution
Questions # 26:

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?

Options:

A.

Capacity planning


B.

Redundancy


C.

Geographic dispersion


D.

Tablet exercise


Expert Solution
Questions # 27:

An employee from the accounting department logs in to the website used for processing the company's payments. After logging in, a new desktop application automatically downloads on the employee's computer and causes the computer to restart. Which of the following attacks has occurred?

Options:

A.

XSS


B.

Watering hole


C.

Typosquatting


D.

Buffer overflow


Expert Solution
Questions # 28:

After a recent vulnerability scan, a security engineer needs to harden the routers within the corporate network. Which of the following is the most appropriate to disable?

Options:

A.

Console access


B.

Routing protocols


C.

VLANs


D.

Web-based administration


Expert Solution
Questions # 29:

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

Options:

A.

SCAP


B.

Net Flow


C.

Antivirus


D.

DLP


Expert Solution
Questions # 30:

A spoofed identity was detected for a digital certificate. Which of the following are the type of unidentified key and the certificate mat could be in use on the company domain?

Options:

A.

Private key and root certificate


B.

Public key and expired certificate


C.

Private key and self-signed certificate


D.

Public key and wildcard certificate


Expert Solution
Viewing page 2 out of 15 pages
Viewing questions 16-30 out of questions