Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 6 out of 16 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following should a security team do first before a new web server goes live?

Options:

A.

Harden the virtual host.


B.

Create WAF rules.


C.

Enable network intrusion detection.


D.

Apply patch management


Expert Solution
Questions # 77:

A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?

Options:

A.

Clustering servers


B.

Geographic dispersion


C.

Load balancers


D.

Off-site backups


Expert Solution
Questions # 78:

A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?

Options:

A.

Threshold


B.

Appetite


C.

Avoidance


D.

Register


Expert Solution
Questions # 79:

The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?

Options:

A.

Hot site


B.

Cold site


C.

Failover site


D.

Warm site


Expert Solution
Questions # 80:

A security team wants to work with the development team to ensure WAF policies are automatically created when applications are deployed. Which concept describes this capability?

Options:

A.

IaC


B.

IoT


C.

IoC


D.

IaaS


Expert Solution
Questions # 81:

A new corporate policy requires all staff to use multifactor authentication to access company resources. Which of the following can be utilized to set up this form of identity and access management? (Select two)

Options:

A.

Authentication tokens


B.

Least privilege


C.

Biometrics


D.

LDAP


E.

Password vaulting


F.

SAML


Expert Solution
Questions # 82:

An organization wants to donate its aging network hardware. Which of the following should the organization perform to prevent any network details from leaking?

Options:

A.

Destruction


B.

Sanitization


C.

Certification


D.

Data retention


Expert Solution
Questions # 83:

The Chief Information Security Officer gives the security community the opportunity to report vulnerabilities on the organization’s public-facing assets. Which of the following does this scenario best describe?

Options:

A.

Bug bounty


B.

Red teaming


C.

Open-source intelligence


D.

Third-party information sharing


Expert Solution
Questions # 84:

Which of the following data types best describes an AI tool developed by a company to automate the ticketing system under a specific contract?

Options:

A.

Classified


B.

Regulated information


C.

Open source


D.

Intellectual property


Expert Solution
Questions # 85:

A security analyst is reviewing logs and discovers the following:

Question # 85

Which of the following should be used lo best mitigate this type of attack?

Options:

A.

Input sanitization


B.

Secure cookies


C.

Static code analysis


D.

Sandboxing


Expert Solution
Questions # 86:

Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?

Options:

A.

Availability


B.

Non-repudiation


C.

Integrity


D.

Confidentiality


Expert Solution
Questions # 87:

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

Options:

A.

SCAP


B.

Net Flow


C.

Antivirus


D.

DLP


Expert Solution
Questions # 88:

Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

Options:

A.

Encrypted


B.

Intellectual property


C.

Critical


D.

Data in transit


Expert Solution
Questions # 89:

Which of the following is used to quantitatively measure the criticality of a vulnerability?

Options:

A.

CVE


B.

CVSS


C.

CIA


D.

CERT


Expert Solution
Questions # 90:

A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the file's creator. Which of the following actions would most likely give the security analyst the information required?

Options:

A.

Obtain the file's SHA-256 hash.


B.

Use hexdump on the file's contents.


C.

Check endpoint logs.


D.

Query the file's metadata.


Expert Solution
Viewing page 6 out of 16 pages
Viewing questions 76-90 out of questions