Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 6 out of 17 pages
Viewing questions 76-90 out of questions
Questions # 76:

An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas. The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?

Options:

A.

SSH


B.

SRTP


C.

S/MIME


D.

PPTP


Expert Solution
Questions # 77:

A security team must help secure a company site after attackers defaced it. The site must be available to a wide range of countries over a secure protocol, but access from known malicious networks should be blocked. Which of the following will best secure the site?

Options:

A.

Next-generation firewall


B.

Reverse proxy


C.

IPSec gateway


D.

Access control server


Expert Solution
Questions # 78:

A company wants to get alerts when others are researching and doing reconnaissance on the company One approach would be to host a part of the Infrastructure online with known vulnerabilities that would appear to be company assets. Which of the following describes this approach?

Options:

A.

Watering hole


B.

Bug bounty


C.

DNS sinkhole


D.

Honeypot


Expert Solution
Questions # 79:

Which of the following threat actors would most likely target an organization by using a logic bomb within an internally-developed application?

Options:

A.

Nation-state


B.

Trusted insider


C.

Organized crime group


D.

Hacktivist


Expert Solution
Questions # 80:

Which of the following most securely protects data at rest?

Options:

A.

TLS 1.2


B.

AES-256


C.

Masking


D.

Salting


Expert Solution
Questions # 81:

Which of the following describes when a user installs an unauthorized application by bypassing the authorized application store and installing a binary file?

Options:

A.

Jailbreaking


B.

Sideloading


C.

Memory injection


D.

VM escaping


Expert Solution
Questions # 82:

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

Options:

A.

Data in use


B.

Data in transit


C.

Geographic restrictions


D.

Data sovereignty


Expert Solution
Questions # 83:

Which of the following types of identification methods can be performed on a deployed application during runtime?

Options:

A.

Dynamic analysis


B.

Code review


C.

Package monitoring


D.

Bug bounty


Expert Solution
Questions # 84:

Which of the following describes the maximum allowance of accepted risk?

Options:

A.

Risk indicator


B.

Risk level


C.

Risk score


D.

Risk threshold


Expert Solution
Questions # 85:

A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?

Options:

A.

Application


B.

IPS/IDS


C.

Network


D.

Endpoint


Expert Solution
Questions # 86:

Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device ' s drive if the device is lost?

Options:

A.

TPM


B.

ECC


C.

FDE


D.

HSM


Expert Solution
Questions # 87:

A bank set up a new server that contains customers ' Pll. Which of the following should the bank use to make sure the sensitive data is not modified?

Options:

A.

Full disk encryption


B.

Network access control


C.

File integrity monitoring


D.

User behavior analytics


Expert Solution
Questions # 88:

An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?

Options:

A.

Real-time recovery


B.

Hot


C.

Cold


D.

Warm


Expert Solution
Questions # 89:

A security administrator recently reset local passwords and the following values were recorded in the system:

Question # 89

Which of the following in the security administrator most likely protecting against?

Options:

A.

Account sharing


B.

Weak password complexity


C.

Pass-the-hash attacks


D.

Password compromise


Expert Solution
Questions # 90:

A software developer released a new application and is distributing application files via the developer’s website. Which of the following should the developer post on the website to allow users to verify the integrity of the downloaded files?

Options:

A.

Hashes


B.

Certificates


C.

Algorithms


D.

Salting


Expert Solution
Viewing page 6 out of 17 pages
Viewing questions 76-90 out of questions