Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

Options:

A.

To track the status of patch installations


B.

To find shadow IT cloud deployments


C.

To continuously monitor hardware inventory


D.

To hunt for active attackers in the network


Expert Solution
Questions # 92:

Which of the following activities is included in the post-incident review phase?

Options:

A.

Determining the root cause of the incident


B.

Developing steps to mitigate the risks of the incident


C.

Validating the accuracy of the evidence collected during the investigation


D.

Reestablishing the compromised system's configuration and settings


Expert Solution
Questions # 93:

The local administrator account for a company's VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have most likely prevented this from happening'?

Options:

A.

Using least privilege


B.

Changing the default password


C.

Assigning individual user IDs


D.

Reviewing logs more frequently


Expert Solution
Questions # 94:

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

Options:

A.

To track the status of patching installations


B.

To find shadow IT cloud deployments


C.

To continuously the monitor hardware inventory


D.

To hunt for active attackers in the network


Expert Solution
Questions # 95:

Which of the following would be the most appropriate way to protect data in transit?

Options:

A.

SHA-256


B.

SSL 3.0


C.

TLS 1.3


D.

AES-256


Expert Solution
Questions # 96:

A security engineer at a large company needs to enhance IAM to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?

Options:

A.

Role-based


B.

Time-of-day restrictions


C.

Least privilege


D.

Biometric authentication


Expert Solution
Questions # 97:

A software developer would like to ensure. The source code cannot be reverse engineered or debugged. Which of the following should the developer consider?

Options:

A.

Version control


B.

Obfuscation toolkit


C.

Code reuse


D.

Continuous integration


E.

Stored procedures


Expert Solution
Questions # 98:

A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?

Options:

A.

Encryption at rest


B.

Masking


C.

Data classification


D.

Permission restrictions


Expert Solution
Questions # 99:

Which of the following can be used to compromise a system that is running an RTOS?

Options:

A.

Cross-site scripting


B.

Memory injection


C.

Replay attack


D.

Ransomware


Expert Solution
Questions # 100:

An administrator must replace an expired SSL certificate. Which of the following does the administrator need to create the new SSL certificate?

Options:

A.

CSR


B.

OCSP


C.

Key


D.

CRL


Expert Solution
Questions # 101:

During a penetration test, a vendor attempts to enter an unauthorized area using an access badge Which of the following types of tests does this represent?

Options:

A.

Defensive


B.

Passive


C.

Offensive


D.

Physical


Expert Solution
Questions # 102:

Which of the following security measures is required when using a cloud-based platform for loT management?

Options:

A.

Encrypted connection


B.

Federated identity


C.

Firewall


D.

Single sign-on


Expert Solution
Questions # 103:

A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement. Which of the following reconnaissance types is the tester performing?

Options:

A.

Active


B.

Passive


C.

Defensive


D.

Offensive


Expert Solution
Questions # 104:

Which of the following is a compensating control for providing user access to a high-risk website?

Options:

A.

Enabling threat prevention features on the firewall


B.

Configuring a SIEM tool to capture all web traffic


C.

Setting firewall rules to allow traffic from any port to that destination


D.

Blocking that website on the endpoint protection software


Expert Solution
Questions # 105:

Employees located off-site must have access to company resources in order to complete their assigned tasks These employees utilize a solution that allows remote access without interception concerns. Which of the following best describes this solution?

Options:

A.

Proxy server


B.

NGFW


C.

VPN


D.

Security zone


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions