Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 3 out of 16 pages
Viewing questions 31-45 out of questions
Questions # 31:

A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?

Options:

A.

Threshold


B.

Appetite


C.

Tolerance


D.

Register


Expert Solution
Questions # 32:

A security engineer needs to quickly identify a signature from a known malicious file. Which of the following analysis methods would the security engineer most likely use?

Options:

A.

Static


B.

Sandbox


C.

Network traffic


D.

Package monitoring


Expert Solution
Questions # 33:

Which of the following describes effective change management procedures?

Options:

A.

Approving the change after a successful deployment


B.

Having a backout plan when a patch fails


C.

Using a spreadsheet for tracking changes


D.

Using an automatic change control bypass for security updates


Expert Solution
Questions # 34:

Which of the following describes the procedures a penetration tester must follow while conducting a test?

Options:

A.

Rules of engagement


B.

Rules of acceptance


C.

Rules of understanding


D.

Rules of execution


Expert Solution
Questions # 35:

Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?

Options:

A.

Deploy a SIEM solution


B.

Create custom scripts to aggregate and analyze logs


C.

Implement EDR technology


D.

Install a unified threat management appliance


Expert Solution
Questions # 36:

A systems administrator discovers a system that is no longer receiving support from the vendor. However, this system and its environment are critical to running the business, cannot be modified, and must stay online. Which of the following risk treatments is the most appropriate in this situation?

Options:

A.

Refect


B.

Accept


C.

Transfer


D.

Avoid


Expert Solution
Questions # 37:

Which of the following is the best reason to complete an audit in a banking environment?

Options:

A.

Regulatory requirement


B.

Organizational change


C.

Self-assessment requirement


D.

Service-level requirement


Expert Solution
Questions # 38:

Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?

Options:

A.

Availability


B.

Accounting


C.

Authentication


D.

Authorization


Expert Solution
Questions # 39:

A company plans to secure its systems by:

Preventing users from sending sensitive data over corporate email

Restricting access to potentially harmful websites

Which of the following features should the company set up? (Select two).

Options:

A.

DLP software


B.

DNS filtering


C.

File integrity monitoring


D.

Stateful firewall


Expert Solution
Questions # 40:

A security team purchases a tool for cloud security posture management. The team is quickly overwhelmed by the number of misconfigurations that the tool detects. Which of the following should the security team configure to establish workflows for cloud resource security?

Options:

A.

CASB


B.

IAM


C.

SOAR


D.

XDR


Expert Solution
Questions # 41:

Which of the following is the first step to take when creating an anomaly detection process?

Options:

A.

Selecting events


B.

Building a baseline


C.

Selecting logging options


D.

Creating an event log


Expert Solution
Questions # 42:

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

Options:

A.

Change management ticketing system


B.

Behavioral analyzer


C.

Collaboration platform


D.

Version control tool


Expert Solution
Questions # 43:

During an investigation, a security analyst discovers traffic going out to a command-and-control server. The analyst must find out if any data exfiltration has occurred. Which of the following would best help the analyst determine this?

Options:

A.

Application log


B.

Metadata


C.

Network log


D.

Packet capture


Expert Solution
Questions # 44:

When trying to access an internal website, an employee reports that a prompt displays, stating that the site is insecure. Which of the following certificate types is the site most likely using?

Options:

A.

Wildcard


B.

Root of trust


C.

Third-party


D.

Self-signed


Expert Solution
Questions # 45:

A security analyst wants to automate a task that shares data between systems. Which of the following is the best option for the analyst to use?

Options:

A.

SOAR


B.

API


C.

SFTP


D.

RDP


Expert Solution
Viewing page 3 out of 16 pages
Viewing questions 31-45 out of questions