Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions
Questions # 76:

A company wants to get alerts when others are researching and doing reconnaissance on the company One approach would be to host a part of the Infrastructure online with known vulnerabilities that would appear to be company assets. Which of the following describes this approach?

Options:

A.

Watering hole


B.

Bug bounty


C.

DNS sinkhole


D.

Honeypot


Expert Solution
Questions # 77:

The Chief Information Security Officer wants to discuss options for a disaster recovery site that allows the business to resume operations as quickly as possible. Which of the following solutions meets this requirement?

Options:

A.

Hot site


B.

Cold site


C.

Geographic dispersion


D.

Warm site


Expert Solution
Questions # 78:

An administrator is installing an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?

Options:

A.

If the wildcard certificate is configured


B.

If the certificate signing request is valid


C.

If the root certificate is installed


D.

If the public key is configured


Expert Solution
Questions # 79:

Which of the following security controls would best guard a payroll system against insider manipulation threats?

Options:

A.

Compensating


B.

Deterrent


C.

Detective


D.

Corrective


Expert Solution
Questions # 80:

A hacker gained access to a system via a phishing attempt that was a direct result of a user clicking a suspicious link. The link laterally deployed ransomware, which laid dormant for multiple weeks, across the network. Which of the following would have mitigated the spread?

Options:

A.

IPS


B.

IDS


C.

WAF


D.

UAT


Expert Solution
Questions # 81:

An organization has a new regulatory requirement to implement corrective controls on a financial system. Which of the following is the most likely reason for the new requirement?

Options:

A.

To defend against insider threats altering banking details


B.

To ensure that errors are not passed to other systems


C.

To allow for business insurance to be purchased


D.

To prevent unauthorized changes to financial data


Expert Solution
Questions # 82:

Which of the following would best prepare a security team for a specific incident response scenario?

Options:

A.

Situational awareness


B.

Risk assessment


C.

Root cause analysis


D.

Tabletop exercise


Expert Solution
Questions # 83:

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

Options:

A.

Accept


B.

Transfer


C.

Mitigate


D.

Avoid


Expert Solution
Questions # 84:

Which of the following scenarios describes a possible business email compromise attack?

Options:

A.

An employee receives a gift card request in an email that has an executive's name in the display field of the email.


B.

Employees who open an email attachment receive messages demanding payment in order to access files.


C.

A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.


D.

An employee receives an email with a link to a phishing site that is designed to look like the company's email portal.


Expert Solution
Questions # 85:

A company’s web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?

Options:

A.

encryption=off\


B.

http://


C.

www.*.com


D.

:443


Expert Solution
Questions # 86:

A security analyst is reviewing logs to identify the destination of command-and-control traffic originating from a compromised device within the on-premises network. Which of the following is the best log to review?

Options:

A.

IDS


B.

Antivirus


C.

Firewall


D.

Application


Expert Solution
Questions # 87:

As part of new compliance audit requirements, multiple servers need to be segmented on different networks and should be reachable only from authorized internal systems. Which of the following would meet the requirements?

Options:

A.

Configure firewall rules to block external access to Internal resources.


B.

Set up a WAP to allow internal access from public networks.


C.

Implement a new IPSec tunnel from internal resources.


D.

Deploy an Internal Jump server to access resources.


Expert Solution
Questions # 88:

A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?

Options:

A.

Place posters around the office to raise awareness of common phishing activities.


B.

Implement email security filters to prevent phishing emails from being delivered


C.

Update the EDR policies to block automatic execution of downloaded programs.


D.

Create additional training for users to recognize the signs of phishing attempts.


Expert Solution
Questions # 89:

Which of the following allows a systems administrator to tune permissions for a file?

Options:

A.

Patching


B.

Access control list


C.

Configuration enforcement


D.

Least privilege


Expert Solution
Questions # 90:

A security analyst reviews web server logs and sees the following entries:

16.22.48.102 -- 26/April/2023 22:00:04.33 GET "http://www.databaseInfo.com/index.html/* " 200

16.22.48.102 -- 26/April/2023 22:00:07.23 GET "http://www.databaseInfo.com/index.html/../ " 404

16.22.48.102 -- 26/April/2023 22:01:16.03 GET "http://www.databaseInfo.com/index.html/../images " 404

16.22.48.102 -- 26/April/2023 22:03:10.25 GET "http://www.databaseInfo.com/index.html/../passwords " 404

16.22.48.102 -- 26/April/2023 22:05:11.22 GET "http://www.databaseInfo.com/index.html/../storedSQLqueries " 404

Which of the following attacks is most likely being attempted?

Options:

A.

Denial of service


B.

Password spraying


C.

SQL injection


D.

Directory traversal


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions