Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

Options:

A.

VM escape


B.

SQL injection


C.

Buffer overflow


D.

Race condition


Expert Solution
Questions # 32:

Which of the following control types involves restricting IP connectivity to a router's web management interface to protect it from being exploited by a vulnerability?

Options:

A.

Corrective


B.

Physical


C.

Preventive


D.

Managerial


Expert Solution
Questions # 33:

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Options:

A.

Automation


B.

Compliance checklist


C.

Attestation


D.

Manual audit


Expert Solution
Questions # 34:

A small business uses kiosks on the sales floor to display product information for customers. A security team discovers the kiosks use end-of-life operating systems. Which of the following is the security team most likely to document as a security implication of the current architecture?

Options:

A.

Patch availability


B.

Product software compatibility


C.

Ease of recovery


D.

Cost of replacement


Expert Solution
Questions # 35:

A service provider wants a cost-effective way to rapidly expand from providing internet links to managing them. Which of the following methods will allow the service provider to best scale its services while maintaining performance consistency?

Options:

A.

Escalation support


B.

Increased workforce


C.

Baseline enforcement


D.

Technical debt


Expert Solution
Questions # 36:

Which of the following should a security team do first before a new web server goes live?

Options:

A.

Harden the virtual host.


B.

Create WAF rules.


C.

Enable network intrusion detection.


D.

Apply patch management


Expert Solution
Questions # 37:

A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

Options:

A.

Open-source intelligence


B.

Bug bounty


C.

Red team


D.

Penetration testing


Expert Solution
Questions # 38:

During a penetration test in a hypervisor, the security engineer is able to inject a malicious payload and access the host filesystem. Which of the following best describes this vulnerability?

Options:

A.

VM escape


B.

Cross-site scripting


C.

Malicious update


D.

SQL injection


Expert Solution
Questions # 39:

Which of the following are the best security controls for controlling on-premises access? (Select two.)

Options:

A.

Swipe card


B.

Picture ID


C.

Phone authentication application


D.

Biometric scanner


E.

Camera


F.

Memorable


Expert Solution
Questions # 40:

Which of the following most securely protects data at rest?

Options:

A.

TLS 1.2


B.

AES-256


C.

Masking


D.

Salting


Expert Solution
Questions # 41:

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?

Options:

A.

Penetration test


B.

Continuity of operations planning


C.

Tabletop exercise


D.

Simulation


Expert Solution
Questions # 42:

A penetration testing report indicated that an organization should implement controls related to database input validation. Which of the following best identifies the type of vulnerability that was likely discovered during the test?

Options:

A.

XSS


B.

Command injection


C.

Buffer overflow


D.

SQLi


Expert Solution
Questions # 43:

The private key for a website was stolen, and a new certificate has been issued. Which of the following needs to be updated next?

Options:

A.

SCEP


B.

CRL


C.

OCSP


D.

CSR


Expert Solution
Questions # 44:

One of a company's vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?

Options:

A.

Virtualization


B.

Firmware


C.

Application


D.

Operating system


Expert Solution
Questions # 45:

Which of the following metrics impacts the backup schedule as part of the BIA?

Options:

A.

RTO


B.

RPO


C.

MTTR


D.

MTBF


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions