Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 7 out of 17 pages
Viewing questions 91-105 out of questions
Questions # 91:

A security technician determines that no additional patches can be applied to an application and the risks of operating as such must be accepted. Additionally, only a limited number of network services should utilize the application. Which of the following best describes this type of mitigation?

Options:

A.

Patching


B.

Segmentation


C.

Isolation


D.

Monitoring


Expert Solution
Questions # 92:

An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device. Which of the following best describes this kind of penetration test?

Options:

A.

Partially known environment


B.

Unknown environment


C.

Integrated


D.

Known environment


Expert Solution
Questions # 93:

A security administrator is implementing encryption on all hard drives in an organization. Which of the following security concepts is the administrator applying?

Options:

A.

Integrity


B.

Authentication


C.

Zero Trust


D.

Confidentiality


Expert Solution
Questions # 94:

Which of the following most accurately describes the order in which a security engineer should implement secure baselines?

Options:

A.

Deploy, maintain, establish


B.

Establish, maintain, deploy


C.

Establish, deploy, maintain


D.

Deploy, establish, maintain


Expert Solution
Questions # 95:

The management team reports employees are missing features on company-provided tablets, causing productivity issues. The team directs IT to resolve the issue within 48 hours. Which of the following is the best solution?

Options:

A.

EDR


B.

COPE


C.

MDM


D.

FDE


Expert Solution
Questions # 96:

An organization maintains intellectual property that it wants to protect. Which of the following concepts would be most beneficial to add to the company ' s security awareness training program?

Options:

A.

Insider threat detection


B.

Simulated threats


C.

Phishing awareness


D.

Business continuity planning


Expert Solution
Questions # 97:

Which of the following are the best for hardening end-user devices? (Selecttwo)

Options:

A.

Full disk encryption


B.

Group-level permissions


C.

Account lockout


D.

Endpoint protection


E.

Proxy server


F.

Segmentation


Expert Solution
Questions # 98:

A company is working with a vendor to perform a penetration test Which of the following includes an estimate about the number of hours required to complete the engagement?

Options:

A.

SOW


B.

BPA


C.

SLA


D.

NDA


Expert Solution
Questions # 99:

A human resources (HR) employee working from home leaves their company laptop open on the kitchen table. A family member walking through the kitchen reads an email from the Chief Financial Officer addressed to the HR department. The email contains information referencing company layoffs. The family member posts the content of the email to social media. Which of the following policies will the HR employee most likely need to review after this incident?

Options:

A.

Hybrid work environment


B.

Operations security


C.

Data loss prevention


D.

Social engineering


Expert Solution
Questions # 100:

A security professional discovers a folder containing an employee ' s personal information on the enterprise ' s shared drive. Which of the following best describes the data type the securityprofessional should use to identify organizational policies and standards concerning the storage of employees ' personal information?

Options:

A.

Legal


B.

Financial


C.

Privacy


D.

Intellectual property


Expert Solution
Questions # 101:

A company ' s website is www. Company. com Attackers purchased the domain wwww. company.com Which of the following types of attacks describes this example?

Options:

A.

Typosquatting


B.

Brand Impersonation


C.

On-path


D.

Watering-hole


Expert Solution
Questions # 102:

Which of the following methods would most likely be used to identify legacy systems?

Options:

A.

Bug bounty program


B.

Vulnerability scan


C.

Package monitoring


D.

Dynamic analysis


Expert Solution
Questions # 103:

Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

Options:

A.

Encrypted


B.

Intellectual property


C.

Critical


D.

Data in transit


Expert Solution
Questions # 104:

Which of the following security measures is required when using a cloud-based platform for loT management?

Options:

A.

Encrypted connection


B.

Federated identity


C.

Firewall


D.

Single sign-on


Expert Solution
Questions # 105:

While considering the organization ' s cloud-adoption strategy, the Chief Information Security Officer sets a goal to outsource patching of firmware, operating systems, and applications to the chosen cloud vendor. Which of the following best meets this goal?

Options:

A.

Community cloud


B.

PaaS


C.

Containerization


D.

Private cloud


E.

SaaS


F.

laaS


Expert Solution
Viewing page 7 out of 17 pages
Viewing questions 91-105 out of questions