Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 7 out of 13 pages
Viewing questions 91-105 out of questions
Questions # 91:

While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website. Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?

Options:

A.

Secure cookies


B.

Input sanitization


C.

Code signing


D.

Blocklist


Expert Solution
Questions # 92:

Which of the following techniques would identify whether data has been modified in transit?

Options:

A.

Hashing


B.

Tokenization


C.

Masking


D.

Encryption


Expert Solution
Questions # 93:

Which of the following is a reason environmental variables are a concern when reviewing potential system vulnerabilities?

Options:

A.

The contents of environmental variables could affect the scope and impact of an exploited vulnerability.


B.

In-memory environmental variable values can be overwritten and used by attackers to insert malicious code.


C.

Environmental variables define cryptographic standards for the system and could create vulnerabilities if deprecated algorithms are used.


D.

Environmental variables will determine when updates are run and could mitigate the likelihood of vulnerability exploitation.


Expert Solution
Questions # 94:

A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers Which of the following solutions is the organization most likely to employ to further increase performance and availability?

Options:

A.

Load balancer


B.

Jump server


C.

Proxy server


D.

SD-WAN


Expert Solution
Questions # 95:

A systems administrator notices that the research and development department is not using the company VPN when accessing various company-related services and systems. Which of the following scenarios describes this activity?

Options:

A.

Espionage


B.

Data exfiltration


C.

Nation-state attack


D.

Shadow IT


Expert Solution
Questions # 96:

Several customers want an organization to verify its security controls are operating effectively and have requested an independent opinion. Which of the following is the most efficient way to address these requests?

Options:

A.

Hire a vendor to perform a penetration test.


B.

Perform an annual self-assessment.


C.

Allow each client the right to audit.


D.

Provide a third-party attestation report.


Expert Solution
Questions # 97:

A security analyst is reviewing logs to identify the destination of command-and-control traffic originating from a compromised device within the on-premises network. Which of the following is the best log to review?

Options:

A.

IDS


B.

Antivirus


C.

Firewall


D.

Application


Expert Solution
Questions # 98:

A security engineer is working to address the growing risks that shadow IT services are introducing to the organization. The organization has taken a cloud-first approach end does not have an on-premises IT infrastructure. Which of the following would best secure the organization?

Options:

A.

Upgrading to a next-generation firewall


B.

Deploying an appropriate in-line CASB solution


C.

Conducting user training on software policies


D.

Configuring double key encryption in SaaS platforms


Expert Solution
Questions # 99:

Which of the following definitions best describes the concept of log co-relation?

Options:

A.

Combining relevant logs from multiple sources into ono location


B.

Searching end processing, data to identify patterns of malicious activity


C.

Making a record of the events that occur in the system


D.

Analyzing the log files of the system components


Expert Solution
Questions # 100:

Which of the following would be best suited for constantly changing environments?

Options:

A.

RTOS


B.

Containers


C.

Embedded systems


D.

SCADA


Expert Solution
Questions # 101:

A company evaluates several options that would allow employees to have remote access to the network. The security team wants to ensure the solution includes AAA to comply with internal security policies. Which of the following should the security team recommend?

Options:

A.

IPSec with RADIUS


B.

RDP connection with LDAPS


C.

Web proxy for all remote traffic


D.

Jump server with 802.1X


Expert Solution
Questions # 102:

Which of the following should be used to ensure a device is inaccessible to a network-connected resource?

Options:

A.

Disablement of unused services


B.

Web application firewall


C.

Host isolation


D.

Network-based IDS


Expert Solution
Questions # 103:

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?

Options:

A.

MSA


B.

SLA


C.

BPA


D.

SOW


Expert Solution
Questions # 104:

Which of the following is prevented by proper data sanitization?

Options:

A.

Hackers' ability to obtain data from used hard drives


B.

Devices reaching end-of-life and losing support


C.

Disclosure of sensitive data through incorrect classification


D.

Incorrect inventory data leading to a laptop shortage


Expert Solution
Questions # 105:

Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?

Options:

A.

TPM


B.

ECC


C.

FDE


D.

HSM


Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 91-105 out of questions