Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 6 out of 13 pages
Viewing questions 76-90 out of questions
Questions # 76:

After a recent ransomware attack on a company's system, an administrator reviewed the log files. Which of the following control types did the administrator use?

Options:

A.

Compensating


B.

Detective


C.

Preventive


D.

Corrective


Expert Solution
Questions # 77:

A security report shows that during a two-week test period. 80% of employees unwittingly disclosed their SSO credentials when accessing an external website. The organization purposelycreated the website to simulate a cost-free password complexity test. Which of the following would best help reduce the number of visits to similar websites in the future?

Options:

A.

Block all outbound traffic from the intranet.


B.

Introduce a campaign to recognize phishing attempts.


C.

Restrict internet access for the employees who disclosed credentials.


D.

Implement a deny list of websites.


Expert Solution
Questions # 78:

Which of the following would be the best solution to deploy a low-cost standby site that includes hardware and internet access?

Options:

A.

Recovery site


B.

Cold site


C.

Hot site


D.

Warm site


Expert Solution
Questions # 79:

Which of the following would most likely be used by attackers to perform credential harvesting?

Options:

A.

Social engineering


B.

Supply chain compromise


C.

Third-party software


D.

Rainbow table


Expert Solution
Questions # 80:

A security analyst is reviewing logs and discovers the following:

Question # 80

Which of the following should be used lo best mitigate this type of attack?

Options:

A.

Input sanitization


B.

Secure cookies


C.

Static code analysis


D.

Sandboxing


Expert Solution
Questions # 81:

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

Options:

A.

Risk tolerance


B.

Risk transfer


C.

Risk register


D.

Risk analysis


Expert Solution
Questions # 82:

Which of the following cryptographic methods is preferred for securing communications with limited computing resources?

Options:

A.

Hashing algorithm


B.

Public key infrastructure


C.

Symmetric encryption


D.

Elliptic curve cryptography


Expert Solution
Questions # 83:

Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).

Options:

A.

Channels by which the organization communicates with customers


B.

The reporting mechanisms for ethics violations


C.

Threat vectors based on the industry in which the organization operates


D.

Secure software development training for all personnel


E.

Cadence and duration of training events


F.

Retraining requirements for individuals who fail phishing simulations


Expert Solution
Questions # 84:

Which of the following control types describes an alert from a SIEM tool?

Options:

A.

Preventive


B.

Corrective


C.

Compensating


D.

Detective


Expert Solution
Questions # 85:

Which of the following is the most likely benefit of conducting an internal audit?

Options:

A.

Findings are reported to shareholders.


B.

Reports are not formal and can be reassigned.


C.

Control gaps are identified for remediation.


D.

The need for external audits is eliminated.


Expert Solution
Questions # 86:

Which of the following topics would most likely be included within an organization's SDLC?

Options:

A.

Service-level agreements


B.

Information security policy


C.

Penetration testing methodology


D.

Branch protection requirements


Expert Solution
Questions # 87:

Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?

Options:

A.

Automated scanning


B.

Penetration testing


C.

Threat hunting


D.

Log aggregation


E.

Adversarial emulation


Expert Solution
Questions # 88:

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

Options:

A.

SLA


B.

BPA


C.

NDA


D.

MOA


Expert Solution
Questions # 89:

A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies.

Which of the following is the most important consideration during development?

Options:

A.

Scalability


B.

Availability


C.

Cost


D.

Ease of deployment


Expert Solution
Questions # 90:

Which of the following is the most common data loss path for an air-gapped network?

Options:

A.

Bastion host


B.

Unsecured Bluetooth


C.

Unpatched OS


D.

Removable devices


Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 76-90 out of questions