Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 3 out of 17 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?

Options:

A.

Destruction


B.

Certification


C.

Retention


D.

Sanitization


Expert Solution
Questions # 32:

An employee from the accounting department logs in to a website. A desktop application automatically downloads on the employee ' s computer. Which of the following has occurred?

Options:

A.

XSS


B.

Watering hole


C.

Typosquatting


D.

Buffer overflow


Expert Solution
Questions # 33:

An administrator is creating a secure method for a contractor to access a test environment. Which of the following would provide the contractor with the best access to the test environment?

Options:

A.

Application server


B.

Jump server


C.

RDP server


D.

Proxy server


Expert Solution
Questions # 34:

After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?

Options:

A.

Group Policy


B.

Content filtering


C.

Data loss prevention


D.

Access control lists


Expert Solution
Questions # 35:

A business uses Wi-Fi with content filleting enabled. An employee noticed a coworker accessed a blocked sue from a work computer and repotted the issue. While Investigating the issue, a security administrator found another device providing internet access to certain employees. Which of the following best describes the security risk?

Options:

A.

The host-based security agent Is not running on all computers.


B.

A rogue access point Is allowing users to bypass controls.


C.

Employees who have certain credentials are using a hidden SSID.


D.

A valid access point is being jammed to limit availability.


Expert Solution
Questions # 36:

A company that has a large IT operation is looking to better control, standardize, and lower the time required to build new servers. Which of the following architectures will best achieve the company’s objectives?

Options:

A.

IoT


B.

IaC


C.

PaaS


D.

ICS


Expert Solution
Questions # 37:

A company processes a large volume of business-to-business transactions and prioritizes data confidentiality over transaction availability. The company’s firewall administrator must configure a new hardware-based firewall to replace the current one. Which of the following should the administrator do to best align with the company requirements in case a security event occurs?

Options:

A.

Ensure the firewall data plane moves to fail-closed mode.


B.

Implement a deny-all rule as the last firewall ACL rule.


C.

Prioritize business-critical application traffic through the firewall.


D.

Configure rate limiting between the firewall interfaces.


Expert Solution
Questions # 38:

Which of the following objectives is best achieved by a tabletop exercise?

Options:

A.

Familiarizing participants with the incident response process


B.

Deciding red and blue team rules of engagement


C.

Quickly determining the impact of an actual security breach


D.

Conducting multiple security investigations in parallel


Expert Solution
Questions # 39:

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Options:

A.

Automation


B.

Compliance checklist


C.

Attestation


D.

Manual audit


Expert Solution
Questions # 40:

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

Question # 40

Which of the following is the most likely way a rogue device was allowed to connect?

Options:

A.

A user performed a MAC cloning attack with a personal device.


B.

A DMCP failure caused an incorrect IP address to be distributed


C.

An administrator bypassed the security controls for testing.


D.

DNS hijacking let an attacker intercept the captive portal traffic.


Expert Solution
Questions # 41:

Which of the following technologies can achieve microsegmentation?

Options:

A.

Next-generation firewalls


B.

Software-defined networking


C.

Embedded systems


D.

Air-gapped


Expert Solution
Questions # 42:

A malicious insider from the marketing team alters records and transfers company funds to a personal account. Which of the following methods would be the best way to secure company records in the future?

Options:

A.

Permission restrictions


B.

Hashing


C.

Input validation


D.

Access control list


Expert Solution
Questions # 43:

An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?

Options:

A.

RDP server


B.

Jump server


C.

Proxy server


D.

Hypervisor


Expert Solution
Questions # 44:

A security manager created new documentation to use in response to various types of security incidents. Which of the following is the next step the manager should take?

Options:

A.

Set the maximum data retention policy.


B.

Securely store the documents on an air-gapped network.


C.

Review the documents ' data classification policy.


D.

Conduct a tabletop exercise with the team.


Expert Solution
Questions # 45:

In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following best describes the security engineer ' s response?

Options:

A.

Risk tolerance


B.

Risk acceptance


C.

Risk importance


D.

Risk appetite


Expert Solution
Viewing page 3 out of 17 pages
Viewing questions 31-45 out of questions