Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 5 out of 16 pages
Viewing questions 61-75 out of questions
Questions # 61:

A government official receives a blank envelope containing photos and a note instructing the official to wire a large sum of money by midnight to prevent the photos from being leaked on the Internet. Which of the following best describes the threat actor's intent?

Options:

A.

Organized crime


B.

Philosophical beliefs


C.

Espionage


D.

Blackmail


Expert Solution
Questions # 62:

Which of the following is a common data removal option for companies that want to wipe sensitive data from hard drives in a repeatable manner but allow the hard drives to be reused?

Options:

A.

Sanitization


B.

Formatting


C.

Degaussing


D.

Defragmentation


Expert Solution
Questions # 63:

A company has a website in a server cluster. One server is experiencing very high usage, while others are nearly unused. Which of the following should the company configure to help distribute traffic quickly?

Options:

A.

Server multiprocessing


B.

Warm site


C.

Load balancer


D.

Proxy server


Expert Solution
Questions # 64:

An administrator is creating a secure method for a contractor to access a test environment. Which of the following would provide the contractor with the best access to the test environment?

Options:

A.

Application server


B.

Jump server


C.

RDP server


D.

Proxy server


Expert Solution
Questions # 65:

A security team receives reports about high latency and complete network unavailability throughout most of the office building. Flow logs from the campus switches show high traffic on TCP 445. Which of the following is most likely the root cause of this incident?

Options:

A.

Buffer overflow


B.

NTP amplification attack


C.

Worm


D.

Kerberoasting attack


Expert Solution
Questions # 66:

A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Select two).

Options:

A.

Key escrow


B.

TPM presence


C.

Digital signatures


D.

Data tokenization


E.

Public key management


F.

Certificate authority linking


Expert Solution
Questions # 67:

A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?

Options:

A.

Geographic dispersion


B.

Platform diversity


C.

Hot site


D.

Load balancing


Expert Solution
Questions # 68:

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

INSTRUCTIONS

Not all attacks and remediation actions will be used.

If at any time you would like to bring back the initial state of the simu-lation, please click the Reset All button.

Question # 68


Expert Solution
Questions # 69:

Which of the following best describes why me SMS DIP authentication method is more risky to implement than the TOTP method?

Options:

A.

The SMS OTP method requires an end user to have an active mobile telephone service and SIM card.


B.

Generally. SMS OTP codes are valid for up to 15 minutes while the TOTP time frame is 30 to 60 seconds


C.

The SMS OTP is more likely to be intercepted and lead to unauthorized disclosure of the code than the TOTP method.


D.

The algorithm used to generate on SMS OTP code is weaker than the one used to generate a TOTP code


Expert Solution
Questions # 70:

A vendor needs to remotely and securely transfer files from one server to another using the command line. Which of the following protocols should be Implemented to allow for this type of access? (Select two).

Options:

A.

SSH


B.

SNMP


C.

RDP


D.

S/MIME


E.

SMTP


F.

SFTP


Expert Solution
Questions # 71:

A security administrator receives multiple reports about the same suspicious email. Which of the following is the most likely reason for the malicious email's continued delivery?

Options:

A.

Employees are flagging legitimate emails as spam.


B.

Information from reported emails is not being used to tune email filtering tools.


C.

Employees are using shadow IT solutions for email.


D.

Employees are forwarding personal emails to company email addresses.


Expert Solution
Questions # 72:

The management team reports employees are missing features on company-provided tablets, causing productivity issues. The team directs IT to resolve the issue within 48 hours. Which of the following is the best solution?

Options:

A.

EDR


B.

COPE


C.

MDM


D.

FDE


Expert Solution
Questions # 73:

Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?

Options:

A.

TPM


B.

ECC


C.

FDE


D.

HSM


Expert Solution
Questions # 74:

Which of the following technologies assists in passively verifying the expired status of a digital certificate?

Options:

A.

OCSP


B.

CRL


C.

TPM


D.

CSR


Expert Solution
Questions # 75:

Which of the following describes an executive team that is meeting in a board room and testing the company's incident response plan?

Options:

A.

Continuity of operations


B.

Capacity planning


C.

Tabletop exercise


D.

Parallel processing


Expert Solution
Viewing page 5 out of 16 pages
Viewing questions 61-75 out of questions