New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following alert types is the most likely to be ignored over time?

Options:

A.

True positive


B.

True negative


C.

False positive


D.

False negative


Expert Solution
Questions # 47:

An organization is looking to optimize its environment and reduce the number of patches necessary for operating systems. Which of the following will best help to achieve this objective?

Options:

A.

Microservices


B.

Virtualization


C.

Real-time operating system


D.

Containers


Expert Solution
Questions # 48:

A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?

Options:

A.

Local data protection regulations


B.

Risks from hackers residing in other countries


C.

Impacts to existing contractual obligations


D.

Time zone differences in log correlation


Expert Solution
Questions # 49:

An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do?

Options:

A.

Deploy multifactor authentication.


B.

Decrease the level of the web filter settings


C.

Implement security awareness training.


D.

Update the acceptable use policy


Expert Solution
Questions # 50:

During a SQL update of a database, a temporary field that was created was replaced by an attacker in order to allow access to the system. Which of the following best describes this type of vulnerability?

Options:

A.

Race condition


B.

Memory injection


C.

Malicious update


D.

Side loading


Expert Solution
Questions # 51:

Which of the following is used to validate a certificate when it is presented to a user?

Options:

A.

OCSP


B.

CSR


C.

CA


D.

CRC


Expert Solution
Questions # 52:

A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

Options:

A.

Testing input validation on the user input fields


B.

Performing code signing on company-developed software


C.

Performing static code analysis on the software


D.

Ensuring secure cookies are use


Expert Solution
Questions # 53:

An employee clicks a malicious link in an email that appears to be from the company's Chief Executive Officer. The employee's computer is infected with ransomware that encrypts the company's files. Which of the following is the most effective way for the company to prevent similar incidents in the future?

Options:

A.

Security awareness training


B.

Database encryption


C.

Segmentation


D.

Reporting suspicious emails


Expert Solution
Questions # 54:

A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the following should be configured on the existing network infrastructure to best prevent this activity?

Options:

A.

Port security


B.

Web application firewall


C.

Transport layer security


D.

Virtual private network


Expert Solution
Questions # 55:

An organization has been experiencing issues with deleted network share data and improperly assigned permissions. Which of the following would best help track and remediate these issues?

Options:

A.

DLP


B.

EDR


C.

FIM


D.

ACL


Expert Solution
Questions # 56:

Which of the following technologies can achieve microsegmentation?

Options:

A.

Next-generation firewalls


B.

Software-defined networking


C.

Embedded systems


D.

Air-gapped


Expert Solution
Questions # 57:

Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?

Options:

A.

ARO


B.

RTO


C.

RPO


D.

ALE


E.

SLE


Expert Solution
Questions # 58:

A security analyst discovers that a large number of employee credentials had been stolen and were being sold on the dark web. The analyst investigates and discovers that some hourly employee credentials were compromised, but salaried employee credentials were not affected.

Most employees clocked in and out while they were Inside the building using one of the kiosks connected to the network. However, some clocked out and recorded their time after leaving to go home. Only those who clocked in and out while Inside the building had credentials stolen. Each of the kiosks are on different floors, and there are multiple routers, since the business segments environments for certain business functions.

Hourly employees are required to use a website called acmetimekeeping.com to clock in and out. This website is accessible from the internet. Which of the following Is the most likely reason for this compromise?

Options:

A.

A brute-force attack was used against the time-keeping website to scan for common passwords.


B.

A malicious actor compromised the time-keeping website with malicious code using an unpatched vulnerability on the site, stealing the credentials.


C.

The internal DNS servers were poisoned and were redirecting acmetimkeeping.com to malicious domain that intercepted the credentials and then passed them through to the real site


D.

ARP poisoning affected the machines in the building and caused the kiosks lo send a copy of all the submitted credentials to a machine.machine.


Expert Solution
Questions # 59:

A systems administrator receives an alert that a company's internal file server is very slow and is only working intermittently. The systems administrator reviews the server management software and finds the following information about the server:

Question # 59

Which of the following indicators most likely triggered this alert?

Options:

A.

Concurrent session usage


B.

Network saturation


C.

Account lockout


D.

Resource consumption


Expert Solution
Questions # 60:

Which of the following uses proprietary controls and is designed to function in harsh environments over many years with limited remote access management?

Options:

A.

ICS


B.

Microservers


C.

Containers


D.

IoT


Expert Solution
Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions