New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following techniques would attract the attention of a malicious attacker in an insider threat scenario?

Options:

A.

Creating a false text file in /docs/salaries


B.

Setting weak passwords in /etc/shadow


C.

Scheduling vulnerable jobs in /etc/crontab


D.

Adding a fake account to /etc/passwd


Expert Solution
Questions # 62:

Which of the following phases of the incident response process attempts to minimize disruption?

Options:

A.

Recovery


B.

Containment


C.

Preparation


D.

Analysis


Expert Solution
Questions # 63:

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Options:

A.

Automation


B.

Compliance checklist


C.

Attestation


D.

Manual audit


Expert Solution
Questions # 64:

A security analyst is evaluating a SaaS application that the human resources department would like to implement. The analyst requests a SOC 2 report from the SaaS vendor. Which of the following processes is the analyst most likely conducting?

Options:

A.

Internal audit


B.

Penetration testing


C.

Attestation


D.

Due diligence


Expert Solution
Questions # 65:

The help desk receives multiple calls that machines with an outdated OS version are running slowly. Several users are seeing virus detection alerts. Which of the following mitigation techniques should be reviewed first?

Options:

A.

Patching


B.

Segmentation


C.

Monitoring


D.

Isolation


Expert Solution
Questions # 66:

Which of the following actions best addresses a vulnerability found on a company's web server?

Options:

A.

Patching


B.

Segmentation


C.

Decommissioning


D.

Monitoring


Expert Solution
Questions # 67:

A company's marketing department collects, modifies, and stores sensitive customer data. The infrastructure team is responsible for securing the data while in transit and at rest. Which of the following data roles describes the customer?

Options:

A.

Processor


B.

Custodian


C.

Subject


D.

Owner


Expert Solution
Questions # 68:

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

Options:

A.

Bluetooth


B.

Wired


C.

NFC


D.

SCADA


Expert Solution
Questions # 69:

Which of the following is the final step of the modem response process?

Options:

A.

Lessons learned


B.

Eradication


C.

Containment


D.

Recovery


Expert Solution
Questions # 70:

Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?

Options:

A.

Deploy a SIEM solution


B.

Create custom scripts to aggregate and analyze logs


C.

Implement EDR technology


D.

Install a unified threat management appliance


Expert Solution
Questions # 71:

An organization plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible. Which of the following models offers the highest level of security?

Options:

A.

Cloud-based


B.

Peer-to-peer


C.

On-premises


D.

Hybrid


Expert Solution
Questions # 72:

Employees located off-site must have access to company resources in order to complete their assigned tasks These employees utilize a solution that allows remote access without interception concerns. Which of the following best describes this solution?

Options:

A.

Proxy server


B.

NGFW


C.

VPN


D.

Security zone


Expert Solution
Questions # 73:

A security administrator recently reset local passwords and the following values were recorded in the system:

Question # 73

Which of the following in the security administrator most likely protecting against?

Options:

A.

Account sharing


B.

Weak password complexity


C.

Pass-the-hash attacks


D.

Password compromise


Expert Solution
Questions # 74:

Which of the following would be the best way to test resiliency in the event of a primary power failure?

Options:

A.

Parallel processing


B.

Tabletop exercise


C.

Simulation testing


D.

Production failover


Expert Solution
Questions # 75:

An organization is evaluating new regulatory requirements associated with the implementation of corrective controls on a group of interconnected financial systems. Which of the following is the most likely reason for the new requirement?

Options:

A.

To defend against insider threats altering banking details


B.

To ensure that errors are not passed to other systems


C.

To allow for business insurance to be purchased


D.

To prevent unauthorized changes to financial data


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions