Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following would be the best way to block unknown programs from executing?

Options:

A.

Access control list


B.

Application allow list.


C.

Host-based firewall


D.

DLP solution


Expert Solution
Questions # 47:

Which of the following actions must an organization take to comply with a person's request for the right to be forgotten?

Options:

A.

Purge all personally identifiable attributes.


B.

Encrypt all of the data.


C.

Remove all of the person’s data.


D.

Obfuscate all of the person’s data.


Expert Solution
Questions # 48:

Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

Options:

A.

Configure all systems to log scheduled tasks.


B.

Collect and monitor all traffic exiting the network.


C.

Block traffic based on known malicious signatures.


D.

Install endpoint management software on all systems.


Expert Solution
Questions # 49:

An organization has a new regulatory requirement to implement corrective controls on a financial system. Which of the following is the most likely reason for the new requirement?

Options:

A.

To defend against insider threats altering banking details


B.

To ensure that errors are not passed to other systems


C.

To allow for business insurance to be purchased


D.

To prevent unauthorized changes to financial data


Expert Solution
Questions # 50:

Which of the following data types relates to data sovereignty?

Options:

A.

Data classified as public in other countries


B.

Personally Identifiable data while traveling


C.

Health data shared between doctors in other nations


D.

Data at rest outside of a country's borders


Expert Solution
Questions # 51:

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

Options:

A.

Changing the remote desktop port to a non-standard number


B.

Setting up a VPN and placing the jump server inside the firewall


C.

Using a proxy for web connections from the remote desktop server


D.

Connecting the remote server to the domain and increasing the password length


Expert Solution
Questions # 52:

A company is experiencing issues with employees leaving the company for a competitor and taking customer contact information with them. Which of the following tools will help prevent this from reoccurring?

Options:

A.

FIM


B.

NAC


C.

IDS


D.

UBA


Expert Solution
Questions # 53:

A software developer wishes to implement an application security technique that will provide assurance of the application's integrity. Which of the following techniques will achieve this?

Options:

A.

Secure cookies


B.

Input validation


C.

Static analysis


D.

Code signing


Expert Solution
Questions # 54:

Which of the following is a social engineering attack in which a bad actor impersonates a web URL?

Options:

A.

Pretexting


B.

Misinformation


C.

Typosquatting


D.

Watering-hole


Expert Solution
Questions # 55:

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.

SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

Options:

A.

[Digital forensics


B.

E-discovery


C.

Incident response


D.

Threat hunting


Expert Solution
Questions # 56:

A software developer would like to ensure. The source code cannot be reverse engineered or debugged. Which of the following should the developer consider?

Options:

A.

Version control


B.

Obfuscation toolkit


C.

Code reuse


D.

Continuous integration


E.

Stored procedures


Expert Solution
Questions # 57:

A security team purchases a tool for cloud security posture management. The team is quickly overwhelmed by the number of misconfigurations that the tool detects. Which of the following should the security team configure to establish workflows for cloud resource security?

Options:

A.

CASB


B.

IAM


C.

SOAR


D.

XDR


Expert Solution
Questions # 58:

A security analyst is assessing several company firewalls. Which of the following cools would The analyst most likely use to generate custom packets to use during the assessment?

Options:

A.

hping


B.

Wireshark


C.

PowerShell


D.

netstat


Expert Solution
Questions # 59:

A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?

Options:

A.

SPF


B.

GPO


C.

NAC


D.

FIM


Expert Solution
Questions # 60:

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

Question # 60

Which of the following is the most likely way a rogue device was allowed to connect?

Options:

A.

A user performed a MAC cloning attack with a personal device.


B.

A DMCP failure caused an incorrect IP address to be distributed


C.

An administrator bypassed the security controls for testing.


D.

DNS hijacking let an attacker intercept the captive portal traffic.


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions