New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following documents details how to accomplish a technical security task?

Options:

A.

Standard


B.

Policy


C.

Guideline


D.

Procedure


Expert Solution
Questions # 92:

A security manager is implementing MFA and patch management. Which of the following would best describe the control type and category? (Select two).

Options:

A.

Physical


B.

Managerial


C.

Detective


D.

Administrator


E.

Preventative


F.

Technical


Expert Solution
Questions # 93:

A security team is setting up a new environment for hosting the organization's on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?

Options:

A.

Visualization and isolation of resources


B.

Network segmentation


C.

Data encryption


D.

Strong authentication policies


Expert Solution
Questions # 94:

A penetration tester visits a client’s website and downloads the site's content. Which of the following actions is the penetration tester performing?

Options:

A.

Unknown environment testing


B.

Vulnerability scan


C.

Due diligence


D.

Passive reconnaissance


Expert Solution
Questions # 95:

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?

Options:

A.

Penetration test


B.

Continuity of operations planning


C.

Tabletop exercise


D.

Simulation


Expert Solution
Questions # 96:

A security analyst is reviewing the following logs:

Question # 96

Which of the following attacks is most likely occurring?

Options:

A.

Password spraying


B.

Account forgery


C.

Pass-t he-hash


D.

Brute-force


Expert Solution
Questions # 97:

During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?

Options:

A.

Analysis


B.

Lessons learned


C.

Detection


D.

Containment


Expert Solution
Questions # 98:

Which of the following best explains a concern with OS-based vulnerabilities?

Options:

A.

An exploit would give an attacker access to system functions that span multiple applications.


B.

The OS vendor's patch cycle is not frequent enough to mitigate the large number of threats.


C.

Most users trust the core operating system features and may not notice if the system has been compromised.


D.

Exploitation of an operating system vulnerability is typically easier than any other vulnerability.


Expert Solution
Questions # 99:

Several customers want an organization to verify its security controls are operating effectively and have requested an independent opinion. Which of the following is the most efficient way to address these requests?

Options:

A.

Hire a vendor to perform a penetration test.


B.

Perform an annual self-assessment.


C.

Allow each client the right to audit.


D.

Provide a third-party attestation report.


Expert Solution
Questions # 100:

A security engineer needs to quickly identify a signature from a known malicious file. Which of the following analysis methods would the security engineer most likely use?

Options:

A.

Static


B.

Sandbox


C.

Network traffic


D.

Package monitoring


Expert Solution
Questions # 101:

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

Options:

A.

Default credentials


B.

Non-segmented network


C.

Supply chain vendor


D.

Vulnerable software


Expert Solution
Questions # 102:

An administrator is Investigating an incident and discovers several users’ computers were Infected with malware after viewing files mat were shared with them. The administrator discovers no degraded performance in the infected machines and an examination of the log files does not show excessive failed logins. Which of the following attacks Is most likely the cause of the malware?

Options:

A.

Malicious flash drive


B.

Remote access Trojan


C.

Brute-forced password


D.

Cryptojacking


Expert Solution
Questions # 103:

An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

Options:

A.

Compromise


B.

Retention


C.

Analysis


D.

Transfer


E.

Inventory


Expert Solution
Questions # 104:

An employee emailed a new systems administrator a malicious web link and convinced the administrator to change the email server's password. The employee used this access to remove the mailboxes of key personnel. Which of the following security awareness concepts would help prevent this threat in the future?

Options:

A.

Recognizing phishing


B.

Providing situational awareness training


C.

Using password management


D.

Reviewing email policies


Expert Solution
Questions # 105:

A user sends an email that includes a digital signature for validation. Which of the following security concepts would ensure that a user cannot deny that they sent the email?

Options:

A.

Non-repudiation


B.

Confidentiality


C.

Integrity


D.

Authentication


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions