New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which of the following is the most likely benefit of conducting an internal audit?

Options:

A.

Findings are reported to shareholders.


B.

Reports are not formal and can be reassigned.


C.

Control gaps are identified for remediation.


D.

The need for external audits is eliminated.


Expert Solution
Questions # 32:

Which of the following data types best describes an AI tool developed by a company to automate the ticketing system under a specific contract?

Options:

A.

Classified


B.

Regulated information


C.

Open source


D.

Intellectual property


Expert Solution
Questions # 33:

A security analyst needs to improve the company’s authentication policy following a password audit. Which of the following should be included in the policy? (Select two).

Options:

A.

Length


B.

Complexity


C.

Least privilege


D.

Something you have


E.

Security keys


F.

Biometrics


Expert Solution
Questions # 34:

A Chief Information Security Officer wants to monitor the company's servers for SQLi attacks and allow for comprehensive investigations if an attack occurs. The company uses SSL decryption to allow traffic monitoring. Which of the following strategies would best accomplish this goal?

Options:

A.

Logging all NetFlow traffic into a SIEM


B.

Deploying network traffic sensors on the same subnet as the servers


C.

Logging endpoint and OS-specific security logs


D.

Enabling full packet capture for traffic entering and exiting the servers


Expert Solution
Questions # 35:

A security team purchases a tool for cloud security posture management. The team is quickly overwhelmed by the number of misconfigurations that the tool detects. Which of the following should the security team configure to establish workflows for cloud resource security?

Options:

A.

CASB


B.

IAM


C.

SOAR


D.

XDR


Expert Solution
Questions # 36:

After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?

Options:

A.

Retain the emails between the security team and affected customers for 30 days.


B.

Retain any communications related to the security breach until further notice.


C.

Retain any communications between security members during the breach response.


D.

Retain all emails from the company to affected customers for an indefinite period of time.


Expert Solution
Questions # 37:

An employee fell for a phishing scam, which allowed an attacker to gain access to a company PC. The attacker scraped the PC’s memory to find other credentials. Without cracking these credentials, the attacker used them to move laterally through the corporate network. Which of the following describes this type of attack?

Options:

A.

Privilege escalation


B.

Buffer overflow


C.

SQL injection


D.

Pass-the-hash


Expert Solution
Questions # 38:

Which of the following is a qualitative approach to risk analysis?

Options:

A.

Including the MTTR and MTBF as part of the risk assessment


B.

Tracking and documenting network risks using a risk register


C.

Assigning a level of high, medium, or low to the risk rating


D.

Using ALE and ARO to help determine whether a risk should be mitigated


Expert Solution
Questions # 39:

During a routine audit, an analyst discovers that a department at a high school uses a simulation program that was not properly vetted before deployment.

Which of the following threats is this an example of?


Expert Solution
Questions # 40:

An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?

Options:

A.

Business continuity


B.

Physical security


C.

Change management


D.

Disaster recovery


Expert Solution
Questions # 41:

Which of the following architectures is most suitable to provide redundancy for critical business processes?

Options:

A.

Network-enabled


B.

Server-side


C.

Cloud-native


D.

Multitenant


Expert Solution
Questions # 42:

A company is concerned about the theft of client data from decommissioned laptops. Which of the following is the most cost-effective method to decrease this risk?

Options:

A.

Wiping


B.

Recycling


C.

Shredding


D.

Deletion


Expert Solution
Questions # 43:

A malicious update was distributed to a common software platform and disabled services at many organizations. Which of the following best describes this type of vulnerability?

Options:

A.

DDoS attack


B.

Rogue employee


C.

Insider threat


D.

Supply chain


Expert Solution
Questions # 44:

Which of the following allows an exploit to go undetected by the operating system?

Options:

A.

Firmware vulnerabilities


B.

Side loading


C.

Memory injection


D.

Encrypted payloads


Expert Solution
Questions # 45:

A few weeks after deploying additional email servers, employees complain that messages are being marked as spam. Which needs to be updated?

Options:

A.

CNAME


B.

SMTP


C.

DLP


D.

SPF


Expert Solution
Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions