Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 2 out of 13 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the following consequences would a retail chain most likely face from customers in the event the retailer is non-compliant with PCI DSS?

Options:

A.

Contractual impacts


B.

Sanctions


C.

Fines


D.

Reputational damage


Expert Solution
Questions # 17:

An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?

Options:

A.

Smishing


B.

Disinformation


C.

Impersonating


D.

Whaling


Expert Solution
Questions # 18:

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

Options:

A.

Memory injection


B.

Race condition


C.

Side loading


D.

SQL injection


Expert Solution
Questions # 19:

Which of the following threat actors would most likely deface the website of a high-profile music group?

Options:

A.

Unskilled attacker


B.

Organized crime


C.

Nation-state


D.

Insider threat


Expert Solution
Questions # 20:

A company decides to purchase an insurance policy. Which of the following risk management strategies is this company implementing?

Options:

A.

Mitigate


B.

Accept


C.

Avoid


D.

Transfer


Expert Solution
Questions # 21:

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Options:

A.

Disaster recovery plan


B.

Incident response procedure


C.

Business continuity plan


D.

Change management procedure


Expert Solution
Questions # 22:

Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?

Options:

A.

Unidentified removable devices


B.

Default network device credentials


C.

Spear phishing emails


D.

Impersonation of business units through typosquatting


Expert Solution
Questions # 23:

Which of the following is the most likely motivation for a hacktivist?

Options:

A.

Financial gain


B.

Service disruption


C.

Philosophical beliefs


D.

Corporate espionage


Expert Solution
Questions # 24:

The Chief Information Security Officer wants to discuss options for a disaster recovery site that allows the business to resume operations as quickly as possible. Which of the following solutions meets this requirement?

Options:

A.

Hot site


B.

Cold site


C.

Geographic dispersion


D.

Warm site


Expert Solution
Questions # 25:

A security administrator receives multiple reports about the same suspicious email. Which of the following is the most likely reason for the malicious email's continued delivery?

Options:

A.

Employees are flagging legitimate emails as spam.


B.

Information from reported emails is not being used to tune email filtering tools.


C.

Employees are using shadow IT solutions for email.


D.

Employees are forwarding personal emails to company email addresses.


Expert Solution
Questions # 26:

A systems administrator creates a script that validates OS version, patch levels, and installed applications when users log in. Which of the following examples best describes the purpose of this script?

Options:

A.

Resource scaling


B.

Policy enumeration


C.

Baseline enforcement


D.

Guardrails implementation


Expert Solution
Questions # 27:

Which of the following documents details how to accomplish a technical security task?

Options:

A.

Standard


B.

Policy


C.

Guideline


D.

Procedure


Expert Solution
Questions # 28:

Which of the following can best contribute to prioritizing patch applications?

Options:

A.

CVSS


B.

SCAP


C.

OSINT


D.

CVE


Expert Solution
Questions # 29:

A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?

Options:

A.

Serverless architecture


B.

Thin clients


C.

Private cloud


D.

Virtual machines


Expert Solution
Questions # 30:

During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Oncethe password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).

Options:

A.

Federation


B.

Identity proofing


C.

Password complexity


D.

Default password changes


E.

Password manager


F.

Open authentication


Expert Solution
Viewing page 2 out of 13 pages
Viewing questions 16-30 out of questions