Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 4 out of 16 pages
Viewing questions 46-60 out of questions
Questions # 46:

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?

Options:

A.

MSA


B.

SLA


C.

BPA


D.

SOW


Expert Solution
Questions # 47:

A security analyst is reviewing the following logs:

Question # 47

Which of the following attacks is most likely occurring?

Options:

A.

Password spraying


B.

Account forgery


C.

Pass-t he-hash


D.

Brute-force


Expert Solution
Questions # 48:

Which of the following strategies most effectively protects sensitive data at rest in a database?

Options:

A.

Hashing


B.

Masking


C.

Tokenization


D.

Obfuscation


Expert Solution
Questions # 49:

Which of the following data types relates to data sovereignty?

Options:

A.

Data classified as public in other countries


B.

Personally Identifiable data while traveling


C.

Health data shared between doctors in other nations


D.

Data at rest outside of a country's borders


Expert Solution
Questions # 50:

Which of the following should a technician perform to verify the integrity of a file transferred from one device to another?

Options:

A.

Authentication


B.

Obfuscation


C.

Hashing


D.

Encryption


Expert Solution
Questions # 51:

A systems administrator creates a script that validates OS version, patch levels, and installed applications when users log in. Which of the following examples best describes the purpose of this script?

Options:

A.

Resource scaling


B.

Policy enumeration


C.

Baseline enforcement


D.

Guardrails implementation


Expert Solution
Questions # 52:

An analyst is reviewing an incident in which a user clicked on a link in a phishing email. Which of the following log sources would the analyst utilize to determine whether the connection was successful?

Options:

A.

Network


B.

System


C.

Application


D.

Authentication


Expert Solution
Questions # 53:

An administrator learns that users are receiving large quantities of unsolicited messages. The administrator checks the content filter and sees hundreds of messages sent to multiple users. Which of the following best describes this kind of attack?

Options:

A.

Watering hole


B.

Typosquatting


C.

Business email compromise


D.

Phishing


Expert Solution
Questions # 54:

An organization is evaluating the cost of licensing a new solution to prevent ransomware. Which of the following is the most helpful in making this decision?

Options:

A.

ALE


B.

SLE


C.

RTO


D.

ARO


Expert Solution
Questions # 55:

An organization is implementing a COPE mobile device management policy. Which of the following should the organization include in the COPE policy? (Select two).

Options:

A.

Remote wiping of the device


B.

Data encryption


C.

Requiring passwords with eight characters


D.

Data usage caps


E.

Employee data ownership


F.

Personal application store access


Expert Solution
Questions # 56:

During a penetration test, a vendor attempts to enter an unauthorized area using an access badge Which of the following types of tests does this represent?

Options:

A.

Defensive


B.

Passive


C.

Offensive


D.

Physical


Expert Solution
Questions # 57:

Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?

Options:

A.

Air gap


B.

Barricade


C.

Port security


D.

Screen subnet


Expert Solution
Questions # 58:

A security team installs an IPS on an organization's network and needs to configure the system to detect and prevent specific network attacks. Which of the following settings should the team configure first within the IPS?

Options:

A.

Allow list policies


B.

Packet Inspection


C.

Logging and reporting


D.

Firewall rules


Expert Solution
Questions # 59:

Which of the following types of vulnerabilities involves attacking a system to access adjacent hosts?

Options:

A.

VM escape


B.

Side loading


C.

Remote code execution


D.

Resource exhaustion


Expert Solution
Questions # 60:

Which of the following teams combines both offensive and defensive testing techniques to protect an organization's critical systems?

Options:

A.

Red


B.

Blue


C.

Purple


D.

Yellow


Expert Solution
Viewing page 4 out of 16 pages
Viewing questions 46-60 out of questions