New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?

Options:

A.

IDS


B.

ACL


C.

EDR


D.

NAC


Expert Solution
Questions # 77:

Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

Options:

A.

Configure all systems to log scheduled tasks.


B.

Collect and monitor all traffic exiting the network.


C.

Block traffic based on known malicious signatures.


D.

Install endpoint management software on all systems.


Expert Solution
Questions # 78:

An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?

Options:

A.

Hardening


B.

Employee monitoring


C.

Configuration enforcement


D.

Least privilege


Expert Solution
Questions # 79:

An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?

Options:

A.

NGFW


B.

WAF


C.

TLS


D.

SD-WAN


Expert Solution
Questions # 80:

A Chief Information Security Officer (CISO) has developed information security policies that relate to the software development methodology. Which of the following would the CISO most likely include in the organization's documentation?

Options:

A.

Peer review requirements


B.

Multifactor authentication


C.

Branch protection tests


D.

Secrets management configurations


Expert Solution
Questions # 81:

A recent penetration test identified that an attacker could flood the MAC address table of network switches. Which of the following would best mitigate this type of attack?

Options:

A.

Load balancer


B.

Port security


C.

IPS


D.

NGFW


Expert Solution
Questions # 82:

A company with a high-availability website is looking to harden its controls at any cost. The company wants to ensure that the site is secure by finding any possible issues. Which of the following would most likely achieve this goal?

Options:

A.

Permission restrictions


B.

Bug bounty program


C.

Vulnerability scan


D.

Reconnaissance


Expert Solution
Questions # 83:

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

Options:

A.

Change management ticketing system


B.

Behavioral analyzer


C.

Collaboration platform


D.

Version control tool


Expert Solution
Questions # 84:

An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned. one of the batch jobs talked and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?

Options:

A.

Job rotation


B.

Retention


C.

Outsourcing


D.

Separation of duties


Expert Solution
Questions # 85:

A security analyst learns that an attack vector, used as part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?

Options:

A.

Endpoint


B.

Application


C.

Firewall


D.

NAC


Expert Solution
Questions # 86:

Various company stakeholders meet to discuss roles and responsibilities in the event of a security breach that would affect offshore offices. Which of the following is this an example of?

Options:

A.

Tabletop exercise


B.

Penetration test


C.

Geographic dispersion


D.

Incident response


Expert Solution
Questions # 87:

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

Options:

A.

Key stretching


B.

Tokenization


C.

Data masking


D.

Salting


Expert Solution
Questions # 88:

An organization is developing a security program that conveys the responsibilities associated with the general operation of systems and software within the organization. Which of the following documents would most likely communicate these expectations?

Options:

A.

Business continuity plan


B.

Change management procedure


C.

Acceptable use policy


D.

Software development life cycle policy


Expert Solution
Questions # 89:

Which of the following is a type of vulnerability that involves inserting scripts into web-based applications in order to take control of the client's web browser?

Options:

A.

SQL injection


B.

Cross-site scripting


C.

Zero-day exploit


D.

On-path attack


Expert Solution
Questions # 90:

Which of the following is a primary security concern for a company setting up a BYOD program?

Options:

A.

End of life


B.

Buffer overflow


C.

VM escape


D.

Jailbreaking


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 76-90 out of questions