Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions
Questions # 31:

A systems administrator receives an alert that a company's internal file server is very slow and is only working intermittently. The systems administrator reviews the server management software and finds the following information about the server:

Question # 31

Which of the following indicators most likely triggered this alert?

Options:

A.

Concurrent session usage


B.

Network saturation


C.

Account lockout


D.

Resource consumption


Expert Solution
Questions # 32:

An accountant is transferring information to a bank over FTP. Which of the following mitigations should the accountant use to protect the confidentiality of the data?

Options:

A.

Tokenization


B.

Data masking


C.

Encryption


D.

Obfuscation


Expert Solution
Questions # 33:

An organization is implementing a COPE mobile device management policy. Which of the following should the organization include in the COPE policy? (Select two).

Options:

A.

Remote wiping of the device


B.

Data encryption


C.

Requiring passwords with eight characters


D.

Data usage caps


E.

Employee data ownership


F.

Personal application store access


Expert Solution
Questions # 34:

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?

Options:

A.

MSA


B.

SLA


C.

BPA


D.

SOW


Expert Solution
Questions # 35:

A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?

Options:

A.

Private


B.

Critical


C.

Sensitive


D.

Public


Expert Solution
Questions # 36:

Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?

Options:

A.

Risk mitigation


B.

Risk identification


C.

Risk treatment


D.

Risk monitoring and review


Expert Solution
Questions # 37:

Which of the following is an algorithm performed to verify that data has not been modified?

Options:

A.

Hash


B.

Code check


C.

Encryption


D.

Checksum


Expert Solution
Questions # 38:

After a recent vulnerability scan, a security engineer needs to harden the routers within the corporate network. Which of the following is the most appropriate to disable?

Options:

A.

Console access


B.

Routing protocols


C.

VLANs


D.

Web-based administration


Expert Solution
Questions # 39:

Which of the following best describes the concept of information being stored outside of its country of origin while still being subject to the laws and requirements of the country of origin?

Options:

A.

Data sovereignty


B.

Geolocation


C.

Intellectual property


D.

Geographic restrictions


Expert Solution
Questions # 40:

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?

Options:

A.

Order of volatility


B.

Preservation of event logs


C.

Chain of custody


D.

Compliance with legal hold


Expert Solution
Questions # 41:

An organization would like to store customer data on a separate part of the network that is not accessible to users on the main corporate network. Which of the following should the administrator use to accomplish this goal?

Options:

A.

Segmentation


B.

Isolation


C.

Patching


D.

Encryption


Expert Solution
Questions # 42:

Which of the following examples would be best mitigated by input sanitization?

Options:

A.

<script>alert ("Warning!") ,-</script>


B.

nmap - 10.11.1.130


C.

Email message: "Click this link to get your free gift card."


D.

Browser message: "Your connection is not private."


Expert Solution
Questions # 43:

A security team receives reports about high latency and complete network unavailability throughout most of the office building. Flow logs from the campus switches show high traffic on TCP 445. Which of the following is most likely the root cause of this incident?

Options:

A.

Buffer overflow


B.

NTP amplification attack


C.

Worm


D.

Kerberoasting attack


Expert Solution
Questions # 44:

Which of the following data states applies to data that is being actively processed by a database server?

Options:

A.

In use


B.

At rest


C.

In transit


D.

Being hashed


Expert Solution
Questions # 45:

Which of the following are the best security controls for controlling on-premises access? (Select two.)

Options:

A.

Swipe card


B.

Picture ID


C.

Phone authentication application


D.

Biometric scanner


E.

Camera


F.

Memorable


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions