Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 2 out of 17 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the following techniques would identify whether data has been modified in transit?

Options:

A.

Hashing


B.

Tokenization


C.

Masking


D.

Encryption


Expert Solution
Questions # 17:

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?

Options:

A.

Capacity planning


B.

Redundancy


C.

Geographic dispersion


D.

Tablet exercise


Expert Solution
Questions # 18:

An attacker submits a request containing unexpected characters in an attempt to gain unauthorized access to information within the underlying systems. Which of the following best describes this attack?

Options:

A.

Side loading


B.

Target of evaluation


C.

Resource reuse


D.

SQL injection


Expert Solution
Questions # 19:

Which of the following is prevented by proper data sanitization?

Options:

A.

Hackers ' ability to obtain data from used hard drives


B.

Devices reaching end-of-life and losing support


C.

Disclosure of sensitive data through incorrect classification


D.

Incorrect inventory data leading to a laptop shortage


Expert Solution
Questions # 20:

Which of the following is a qualitative approach to risk analysis?

Options:

A.

Including the MTTR and MTBF as part of the risk assessment


B.

Tracking and documenting network risks using a risk register


C.

Assigning a level of high, medium, or low to the risk rating


D.

Using ALE and ARO to help determine whether a risk should be mitigated


Expert Solution
Questions # 21:

Which of the following best protects sensitive data in transit across a geographically dispersed Infrastructure?

Options:

A.

Encryption


B.

Masking


C.

Tokenization


D.

Obfuscation


Expert Solution
Questions # 22:

A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?

Options:

A.

Serverless framework


B.

Type 1 hvpervisor


C.

SD-WAN


D.

SDN


Expert Solution
Questions # 23:

Which of the following environments utilizes a subset of customer data and is most likely to be used to assess the impacts of major system upgrades and demonstrate system features?

Options:

A.

Development


B.

Test


C.

Production


D.

Staging


Expert Solution
Questions # 24:

A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering.

Which of the following teams will conduct this assessment activity?

Options:

A.

White


B.

Purple


C.

Blue


D.

Red


Expert Solution
Questions # 25:

A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?

Options:

A.

Private


B.

Critical


C.

Sensitive


D.

Public


Expert Solution
Questions # 26:

Which of the following is the best way to secure an on-site data center against intrusion from an insider?

Options:

A.

Bollards


B.

Access badge


C.

Motion sensor


D.

Video surveillance


Expert Solution
Questions # 27:

A systems administrator receives the following alert from a file integrity monitoring tool:

The hash of the cmd.exe file has changed.

The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?

Options:

A.

The end user changed the file permissions.


B.

A cryptographic collision was detected.


C.

A snapshot of the file system was taken.


D.

A rootkit was deployed.


Expert Solution
Questions # 28:

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

Options:

A.

Packet captures


B.

Vulnerability scans


C.

Metadata


D.

Dashboard


Expert Solution
Questions # 29:

Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?

Options:

A.

Air gap


B.

Barricade


C.

Port security


D.

Screen subnet


Expert Solution
Questions # 30:

Which of the following is a common data removal option for companies that want to wipe sensitive data from hard drives in a repeatable manner but allow the hard drives to be reused?

Options:

A.

Sanitization


B.

Formatting


C.

Degaussing


D.

Defragmentation


Expert Solution
Viewing page 2 out of 17 pages
Viewing questions 16-30 out of questions