Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
Questions # 16:

Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

Options:

A.

Remote access points should fail closed.


B.

Logging controls should fail open.


C.

Safety controls should fail open.


D.

Logical security controls should fail closed.


Expert Solution
Questions # 17:

Which of the following control types is AUP an example of?

Options:

A.

Physical


B.

Managerial


C.

Technical


D.

Operational


Expert Solution
Questions # 18:

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Options:

A.

Secured zones


B.

Subject role


C.

Adaptive identity


D.

Threat scope reduction


Expert Solution
Questions # 19:

A company is in the process of migrating to cloud-based services. The company's IT department has limited resources for migration and ongoing support. Which of the following best meets the company's needs?

Options:

A.

IPS


B.

WAF


C.

SASE


D.

IAM


Expert Solution
Questions # 20:

The help desk receives multiple calls that machines with an outdated OS version are running slowly. Several users are seeing virus detection alerts. Which of the following mitigation techniques should be reviewed first?

Options:

A.

Patching


B.

Segmentation


C.

Monitoring


D.

Isolation


Expert Solution
Questions # 21:

A software developer wishes to implement an application security technique that will provide assurance of the application's integrity. Which of the following techniques will achieve this?

Options:

A.

Secure cookies


B.

Input validation


C.

Static analysis


D.

Code signing


Expert Solution
Questions # 22:

While a school district is performing state testing, a security analyst notices all internet services are unavailable. The analyst discovers that ARP poisoning is occurring on the network and then terminates access for the host. Which of the following is most likely responsible for this malicious activity?

Options:

A.

Unskilled attacker


B.

Shadow IT


C.

Credential stuffing


D.

DMARC failure


Expert Solution
Questions # 23:

After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?

Options:

A.

Retain the emails between the security team and affected customers for 30 days.


B.

Retain any communications related to the security breach until further notice.


C.

Retain any communications between security members during the breach response.


D.

Retain all emails from the company to affected customers for an indefinite period of time.


Expert Solution
Questions # 24:

Which of the following is the best way to remove personal data from a social media account that is no longer being used?

Options:

A.

Exercise the right to be forgotten


B.

Uninstall the social media application


C.

Perform a factory reset


D.

Terminate the social media account


Expert Solution
Questions # 25:

An organization issued new laptops to all employees and wants to provide web filtering both in and out of the office without configuring additional access to the network. Which of the following types of web filtering should a systems administrator configure?

Options:

A.

Agent-based


B.

Centralized proxy


C.

URL scanning


D.

Content categorization


Expert Solution
Questions # 26:

Which of the following Is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?

Options:

A.

Open-source intelligence


B.

Port scanning


C.

Pivoting


D.

Exploit validation


Expert Solution
Questions # 27:

An engineer moved to another team and is unable to access the new team's shared folders while still being able to access the shared folders from the former team. After opening a ticket, the engineer discovers that the account was never moved to the new group. Which of the following access controls is most likely causing the lack of access? 1  

Options:

A.

Role-based


B.

Discretionary


C.

Time of day


D.

Least privilege


Expert Solution
Questions # 28:

Which of the following describes the maximum allowance of accepted risk?

Options:

A.

Risk indicator


B.

Risk level


C.

Risk score


D.

Risk threshold


Expert Solution
Questions # 29:

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

Options:

A.

Key stretching


B.

Tokenization


C.

Data masking


D.

Salting


Expert Solution
Questions # 30:

A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?

Options:

A.

Concurrent session usage


B.

Secure DNS cryptographic downgrade


C.

On-path resource consumption


D.

Reflected denial of service


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions