Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
Questions # 46:

An attacker submits a request containing unexpected characters in an attempt to gain unauthorized access to information within the underlying systems. Which of the following best describes this attack?

Options:

A.

Side loading


B.

Target of evaluation


C.

Resource reuse


D.

SQL injection


Expert Solution
Questions # 47:

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

Options:

A.

SLA


B.

BPA


C.

NDA


D.

MOA


Expert Solution
Questions # 48:

An administrator wants to perform a risk assessment without using proprietary company information. Which of the following methods should the administrator use to gather information?

Options:

A.

Network scanning


B.

Penetration testing


C.

Open-source intelligence


D.

Configuration auditing


Expert Solution
Questions # 49:

Which of the following can best contribute to prioritizing patch applications?

Options:

A.

CVSS


B.

SCAP


C.

OSINT


D.

CVE


Expert Solution
Questions # 50:

An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?

Options:

A.

Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53


B.

Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53


C.

Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53


D.

Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53


Expert Solution
Questions # 51:

A security team is setting up a new environment for hosting the organization's on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?

Options:

A.

Visualization and isolation of resources


B.

Network segmentation


C.

Data encryption


D.

Strong authentication policies


Expert Solution
Questions # 52:

Which of the following alert types is the most likely to be ignored over time?

Options:

A.

True positive


B.

True negative


C.

False positive


D.

False negative


Expert Solution
Questions # 53:

A company processes and stores sensitive data on its own systems. Which of the following steps should the company take first to ensure compliance with privacy regulations?

Options:

A.

Implement access controls and encryption.


B.

Develop and provide training on data protection policies.


C.

Create incident response and disaster recovery plans.


D.

Purchase and install security software.


Expert Solution
Questions # 54:

A company's website is www. Company. com Attackers purchased the domain wwww. company.com Which of the following types of attacks describes this example?

Options:

A.

Typosquatting


B.

Brand Impersonation


C.

On-path


D.

Watering-hole


Expert Solution
Questions # 55:

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?

Options:

A.

Penetration test


B.

Continuity of operations planning


C.

Tabletop exercise


D.

Simulation


Expert Solution
Questions # 56:

Which of the following best describe the benefits of a microservices architecture when compared to a monolithic architecture? (Select two).

Options:

A.

Easter debugging of the system


B.

Reduced cost of ownership of the system


C.

Improved scalability of the system


D.

Increased compartmentalization of the system


E.

Stronger authentication of the system


F.

Reduced complexity of the system


Expert Solution
Questions # 57:

Which of the following is a type of vulnerability that involves inserting scripts into web-based applications in order to take control of the client's web browser?

Options:

A.

SQL injection


B.

Cross-site scripting


C.

Zero-day exploit


D.

On-path attack


Expert Solution
Questions # 58:

A security analyst learns that an attack vector, used as part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?

Options:

A.

Endpoint


B.

Application


C.

Firewall


D.

NAC


Expert Solution
Questions # 59:

Which of the following would most likely be used by attackers to perform credential harvesting?

Options:

A.

Social engineering


B.

Supply chain compromise


C.

Third-party software


D.

Rainbow table


Expert Solution
Questions # 60:

A Chief Information Security Officer would like to conduct frequent, detailed reviews of systems and procedures to track compliance objectives. Which of the following is the best method to achieve this objective?

Options:

A.

Third-party attestation


B.

Penetration testing


C.

Internal auditing


D.

Vulnerability scans


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions