Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 61-75 out of questions
Questions # 61:

A user is attempting to patch a critical system, but the patch fails to transfer. Which of the following access controls is most likely inhibiting the transfer?

Options:

A.

Attribute-based


B.

Time of day


C.

Role-based


D.

Least privilege


Expert Solution
Questions # 62:

Which of the following examples would be best mitigated by input sanitization?

Options:

A.

<script>alert ("Warning!") ,-</script>


B.

nmap - 10.11.1.130


C.

Email message: "Click this link to get your free gift card."


D.

Browser message: "Your connection is not private."


Expert Solution
Questions # 63:

A company installed cameras and added signs to alert visitors that they are being recorded. Which of the following controls did the company implement? (Select two).

Options:

A.

Directive


B.

Deterrent


C.

Preventive


D.

Detective


E.

Corrective


F.

Technical


Expert Solution
Questions # 64:

Various company stakeholders meet to discuss roles and responsibilities in the event of a security breach affecting offshore offices. Which of the following is this an example of?

Options:

A.

Tabletop exercise


B.

Penetration test


C.

Geographic dispersion


D.

Incident response


Expert Solution
Questions # 65:

According to various privacy rules and regulations, users have the power to request that all data pertaining to them is deleted. This is known as:

Options:

A.

Right to be forgotten


B.

Attestation and acknowledgement


C.

Data retention


D.

Information deletion


Expert Solution
Questions # 66:

Which of the following best describes the concept of information being stored outside of its country of origin while still being subject to the laws and requirements of the country of origin?

Options:

A.

Data sovereignty


B.

Geolocation


C.

Intellectual property


D.

Geographic restrictions


Expert Solution
Questions # 67:

Which of the following is a compensating control for providing user access to a high-risk website?

Options:

A.

Enabling threat prevention features on the firewall


B.

Configuring a SIEM tool to capture all web traffic


C.

Setting firewall rules to allow traffic from any port to that destination


D.

Blocking that website on the endpoint protection software


Expert Solution
Questions # 68:

An administrator implements web-filtering products but still sees that users are visiting malicious links. Which of the following configuration items does the security administrator need to review?

Options:

A.

Intrusion prevention system


B.

Content categorization


C.

Encryption


D.

DNS service


Expert Solution
Questions # 69:

Which of the following methods would most likely be used to identify legacy systems?

Options:

A.

Bug bounty program


B.

Vulnerability scan


C.

Package monitoring


D.

Dynamic analysis


Expert Solution
Questions # 70:

Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?

Options:

A.

Preparation


B.

Recovery


C.

Lessons learned


D.

Analysis


Expert Solution
Questions # 71:

The physical security team at a company receives reports that employees are not displaying their badges. The team also observes employees tailgating at controlled entrances. Which of the following topics will the security team most likely emphasize in upcoming security training?

Options:

A.

Social engineering


B.

Situational awareness


C.

Phishing


D.

Acceptable use policy


Expert Solution
Questions # 72:

A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?

Options:

A.

Concurrent session usage


B.

Secure DNS cryptographic downgrade


C.

On-path resource consumption


D.

Reflected denial of service


Expert Solution
Questions # 73:

A security administrator recently reset local passwords and the following values were recorded in the system:

Question # 73

Which of the following in the security administrator most likely protecting against?

Options:

A.

Account sharing


B.

Weak password complexity


C.

Pass-the-hash attacks


D.

Password compromise


Expert Solution
Questions # 74:

A security audit of an organization revealed that most of the IT staff members have domain administrator credentials and do not change the passwords regularly. Which of the following solutions should the security learn propose to resolve the findings in the most complete way?

Options:

A.

Creating group policies to enforce password rotation on domain administrator credentials


B.

Reviewing the domain administrator group, removing all unnecessary administrators, and rotating all passwords


C.

Integrating the domain administrator's group with an IdP and requiring SSO with MFA for all access


D.

Securing domain administrator credentials in a PAM vault and controlling access with role-based access control


Expert Solution
Questions # 75:

A security analyst is reviewing the following logs about a suspicious activity alert for a user's VPN log-ins. Which of the following malicious activity indicators triggered the alert?

✅Log Summary:

User logs in fromChicago, ILmultiple times, then suddenly a successful login appears fromRome, Italy, followed again by Chicago logins — all within ashort time span.

Options:

A.

Impossible travel


B.

Account lockout


C.

Blocked content


D.

Concurrent session usage


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 61-75 out of questions