Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 7 out of 16 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following are the best for hardening end-user devices? (Selecttwo)

Options:

A.

Full disk encryption


B.

Group-level permissions


C.

Account lockout


D.

Endpoint protection


E.

Proxy server


F.

Segmentation


Expert Solution
Questions # 92:

The security team at a large global company needs to reduce the cost of storing data used for performing investigations. Which of the following types of data should have its retention length reduced?

Options:

A.

Packet capture


B.

Endpoint logs


C.

OS security logs


D.

Vulnerability scan


Expert Solution
Questions # 93:

Which of the following solutions would most likely be used in the financial industry to mask sensitive data?

Options:

A.

Tokenization


B.

Hashing


C.

Salting


D.

Steganography


Expert Solution
Questions # 94:

A small business uses kiosks on the sales floor to display product information for customers. A security team discovers the kiosks use end-of-life operating systems. Which of the following is the security team most likely to document as a security implication of the current architecture?

Options:

A.

Patch availability


B.

Product software compatibility


C.

Ease of recovery


D.

Cost of replacement


Expert Solution
Questions # 95:

Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?

Options:

A.

Risk mitigation


B.

Risk identification


C.

Risk treatment


D.

Risk monitoring and review


Expert Solution
Questions # 96:

Which of the following is a risk of conducting a vulnerability assessment?

Options:

A.

A disruption of business operations


B.

Unauthorized access to the system


C.

Reports of false positives


D.

Finding security gaps in the system


Expert Solution
Questions # 97:

A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?

Options:

A.

Partition


B.

Asymmetric


C.

Full disk


D.

Database


Expert Solution
Questions # 98:

Which of the following would best prepare a security team for a specific incident response scenario?

Options:

A.

Situational awareness


B.

Risk assessment


C.

Root cause analysis


D.

Tabletop exercise


Expert Solution
Questions # 99:

Which of the following is an example of a data protection strategy that uses tokenization?

Options:

A.

Encrypting databases containing sensitive data


B.

Replacing sensitive data with surrogate values


C.

Removing sensitive data from production systems


D.

Hashing sensitive data in critical systems


Expert Solution
Questions # 100:

A security analyst learns that an attack vector, used as part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?

Options:

A.

Endpoint


B.

Application


C.

Firewall


D.

NAC


Expert Solution
Questions # 101:

Which of the following describes a security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system?

Options:

A.

SIEM


B.

DLP


C.

IDS


D.

SNMP


Expert Solution
Questions # 102:

Which of the following risk management strategies is being used when a Chief Information Security Officer ignores known vulnerabilities identified during a risk assessment?

Options:

A.

Transfer


B.

Avoid


C.

Mitigate


D.

Accept


Expert Solution
Questions # 103:

A security analyst receives an alert from a corporate endpoint used by employees to issue visitor badges. The alert contains the following details:

Which of the following best describes the indicator that triggered the alert?

Options:

A.

Blocked content


B.

Brute-force attack


C.

Concurrent session usage


D.

Account lockout


Expert Solution
Questions # 104:

Which of the following techniques would attract the attention of a malicious attacker in an insider threat scenario?

Options:

A.

Creating a false text file in /docs/salaries


B.

Setting weak passwords in /etc/shadow


C.

Scheduling vulnerable jobs in /etc/crontab


D.

Adding a fake account to /etc/passwd


Expert Solution
Questions # 105:

An administrator has configured a quarantine subnet for all guest devices that connect to the network. Which of the following would be best for the security team to configure on the MDM before allowing access to corporate resources?

Options:

A.

Device fingerprinting


B.

Compliance attestation


C.

NAC


D.

802.1X


Expert Solution
Viewing page 7 out of 16 pages
Viewing questions 91-105 out of questions