Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following can best protect against an employee inadvertently installing malware on a company system?

Options:

A.

Host-based firewall


B.

System isolation


C.

Least privilege


D.

Application allow list


Expert Solution
Questions # 62:

Which of the following is a reason environmental variables are a concern when reviewing potential system vulnerabilities?

Options:

A.

The contents of environmental variables could affect the scope and impact of an exploited vulnerability.


B.

In-memory environmental variable values can be overwritten and used by attackers to insert malicious code.


C.

Environmental variables define cryptographic standards for the system and could create vulnerabilities if deprecated algorithms are used.


D.

Environmental variables will determine when updates are run and could mitigate the likelihood of vulnerability exploitation.


Expert Solution
Questions # 63:

Which of the following is the most relevant reason a DPO would develop a data inventory?

Options:

A.

To manage data storage requirements better


B.

To determine the impact in the event of a breach


C.

To extend the length of time data can be retained


D.

To automate the reduction of duplicated data


Expert Solution
Questions # 64:

A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?

Options:

A.

Exemption


B.

Exception


C.

Avoid


D.

Transfer


Expert Solution
Questions # 65:

Which of the following risk management strategies should an enterprise adopt first if a legacy application is critical to business operations and there are preventative controls that are not yet implemented?

Options:

A.

Mitigate


B.

Accept


C.

Transfer


D.

Avoid


Expert Solution
Questions # 66:

An IT administrator needs to ensure data retention standards are implemented on an enterprise application. Which of the Mowing describes the administrator's role?

Options:

A.

Processor


B.

Custodian


C.

Privacy officer


D.

Owner


Expert Solution
Questions # 67:

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

Options:

A.

Public key infrastructure


B.

Open public ledger


C.

Public key encryption


D.

Key escrow


Expert Solution
Questions # 68:

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

Options:

A.

Segmentation


B.

Isolation


C.

Hardening


D.

Decommissioning


Expert Solution
Questions # 69:

The Chief Information Security Officer wants to put security measures in place to protect PlI. The organization needs to use its existing labeling and classification system to accomplish this goal. Which of the following would most likely be configured to meet the requirements?

Options:

A.

Tokenization


B.

S/MIME


C.

DLP


D.

MFA


Expert Solution
Questions # 70:

While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website. Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?

Options:

A.

Secure cookies


B.

Input sanitization


C.

Code signing


D.

Blocklist


Expert Solution
Questions # 71:

A systems administrator is concerned about vulnerabilities within cloud computing instances Which of the following is most important for the administrator to consider when architecting a cloud computing environment?

Options:

A.

SQL injection


B.

TOC/TOU


C.

VM escape


D.

Tokenization


E.

Password spraying


Expert Solution
Questions # 72:

A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?

Options:

A.

Off-the-shelf software


B.

Orchestration


C.

Baseline


D.

Policy enforcement


Expert Solution
Questions # 73:

A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?

Options:

A.

Geographic dispersion


B.

Platform diversity


C.

Hot site


D.

Load balancing


Expert Solution
Questions # 74:

A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?

Options:

A.

Partition


B.

Asymmetric


C.

Full disk


D.

Database


Expert Solution
Questions # 75:

Which of the following should a systems administrator use to decrease the company's hardware attack surface?

Options:

A.

Replication


B.

Isolation


C.

Centralization


D.

Virtualization


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions