Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 5 out of 17 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following organizational documents is most often used to establish and communicate expectations associated with integrity and ethical behavior within an organization?

Options:

A.

AUP


B.

SLA


C.

EULA


D.

MOA


Expert Solution
Questions # 62:

A security analyst receives an alert from a web server that contains the following logs:

GET /image?filename=../../../etc/passwd

Host: AcmeInc.web.net

useragent: python-request/2.27.1

GET /image?filename=../../../etc/shadow

Host: AcmeInc.web.net

useragent: python-request/2.27.1

Which of the following attacks is being attempted?

Options:

A.

File injection


B.

Privilege escalation


C.

Directory traversal


D.

Cookie forgery


Expert Solution
Questions # 63:

Which of the following risk analysis attributes measures the chance that a vulnerability will be exploited?

Options:

A.

Exposure factor


B.

Impact


C.

Severity


D.

Likelihood


Expert Solution
Questions # 64:

A company is implementing a vendor ' s security tool in the cloud. The security director does not want to manage users and passwords specific to this tool but would rather utilize the company ' s standard user directory. Which of the following should the company implement?

Options:

A.

802.1X


B.

SAML


C.

RADIUS


D.

CHAP


Expert Solution
Questions # 65:

An administrator installs an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?

Options:

A.

If the wildcard certificate is configured


B.

If the certificate signing request is valid


C.

If the root certificate is installed


D.

If the public key is configured


Expert Solution
Questions # 66:

Which of the following can best contribute to prioritizing patch applications?

Options:

A.

CVSS


B.

SCAP


C.

OSINT


D.

CVE


Expert Solution
Questions # 67:

Which of the following best describes the concept of information being stored outside of its country of origin while still being subject to the laws and requirements of the country of origin?

Options:

A.

Data sovereignty


B.

Geolocation


C.

Intellectual property


D.

Geographic restrictions


Expert Solution
Questions # 68:

Which of the following consequences would a retail chain most likely face from customers in the event the retailer is non-compliant with PCI DSS?

Options:

A.

Contractual impacts


B.

Sanctions


C.

Fines


D.

Reputational damage


Expert Solution
Questions # 69:

After reviewing the following vulnerability scanning report:

Server:192.168.14.6

Service: Telnet

Port: 23 Protocol: TCP

Status: Open Severity: High

Vulnerability: Use of an insecure network protocol

A security analyst performs the following test:

nmap -p 23 192.168.14.6 —script telnet-encryption

PORT STATE SERVICE REASON

23/tcp open telnet syn-ack

I telnet encryption:

| _ Telnet server supports encryption

Which of the following would the security analyst conclude for this reported vulnerability?

Options:

A.

It is a false positive.


B.

A rescan is required.


C.

It is considered noise.


D.

Compensating controls exist.


Expert Solution
Questions # 70:

A remote employee navigates to a shopping website on their company-owned computer. The employee clicks a link that contains a malicious file. Which of the following would prevent this file from downloading?

Options:

A.

DLP


B.

FIM


C.

NAC


D.

EDR


Expert Solution
Questions # 71:

Which of the following is a technical security control?

Options:

A.

Security guard


B.

Policy


C.

Fence


D.

Firewall


Expert Solution
Questions # 72:

A security administrator wants to determine if the company ' s social engineering training is effective. Which of the following should the administrator do to complete this task?

Options:

A.

Set up a honeypot.


B.

Send out a survey.


C.

Set up a focus group.


D.

Conduct a phishing campaign.


Expert Solution
Questions # 73:

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

Options:

A.

Accept


B.

Transfer


C.

Mitigate


D.

Avoid


Expert Solution
Questions # 74:

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company ' s reliance on open-source libraries?

Options:

A.

Buffer overflow


B.

SQL injection


C.

Cross-site scripting


D.

Zero day


Expert Solution
Questions # 75:

Which of the following would be the best way to block unknown programs from executing?

Options:

A.

Access control list


B.

Application allow list.


C.

Host-based firewall


D.

DLP solution


Expert Solution
Viewing page 5 out of 17 pages
Viewing questions 61-75 out of questions