Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 8 out of 16 pages
Viewing questions 106-120 out of questions
Questions # 106:

During a recent log review, an analyst found evidence of successful injection attacks. Which of the following will best address this issue?

Options:

A.

Authentication


B.

Secure cookies


C.

Static code analysis


D.

Input validation


Expert Solution
Questions # 107:

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

Options:

A.

If a security incident occurs on the device, the correct employee can be notified.


B.

The security team will be able to send user awareness training to the appropriate device.


C.

Users can be mapped to their devices when configuring software MFA tokens.


D.

User-based firewall policies can be correctly targeted to the appropriate laptops.


E.

When conducting penetration testing, the security team will be able to target the desired laptops.


F.

Company data can be accounted for when the employee leaves the organization.


Expert Solution
Questions # 108:

An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)

Options:

A.

Typosquatting


B.

Phishing


C.

Impersonation


D.

Vishing


E.

Smishing


F.

Misinformation


Expert Solution
Questions # 109:

Which of the following actions must an organization take to comply with a person's request for the right to be forgotten?

Options:

A.

Purge all personally identifiable attributes.


B.

Encrypt all of the data.


C.

Remove all of the person’s data.


D.

Obfuscate all of the person’s data.


Expert Solution
Questions # 110:

A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?

Options:

A.

Impersonation


B.

Replication


C.

Phishing


D.

Smishing


Expert Solution
Questions # 111:

A security officer observes that a software development team is not complying with its corporate security policy on encrypting confidential data. Which of the following categories refers to this type of non-compliance?

Options:

A.

External


B.

Standard


C.

Regulation


D.

Internal


Expert Solution
Questions # 112:

A new security regulation was announced that will take effect in the coming year. A company must comply with it to remain in business. Which of the following activities should the company perform next?

Options:

A.

Gap analysis


B.

Policy review


C.

Security procedure evaluation


D.

Threat scope reduction


Expert Solution
Questions # 113:

An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device. Which of the following best describes this kind of penetration test?

Options:

A.

Partially known environment


B.

Unknown environment


C.

Integrated


D.

Known environment


Expert Solution
Questions # 114:

Which of the following should an internal auditor check for first when conducting an audit of the organization’s risk management program?

Options:

A.

Policies and procedures


B.

Asset management


C.

Vulnerability assessment


D.

Business impact analysis


Expert Solution
Questions # 115:

Which of the following definitions best describes the concept of log co-relation?

Options:

A.

Combining relevant logs from multiple sources into ono location


B.

Searching end processing, data to identify patterns of malicious activity


C.

Making a record of the events that occur in the system


D.

Analyzing the log files of the system components


Expert Solution
Questions # 116:

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?

Options:

A.

Virus


B.

Trojan


C.

Spyware


D.

Ransomware


Expert Solution
Questions # 117:

A store is setting up wireless access for their employees. Management wants to limit the number of access points while ensuring all areas of the store are covered. Which of the following tools will help management determine the number of access points needed?

Options:

A.

Signal locator


B.

WPA3


C.

Heat map


D.

Site survey


Expert Solution
Questions # 118:

An incident response specialist must stop a malicious attack from expanding to other parts of an organization. Which of the following should the incident response specialist perform first?

Options:

A.

Eradication


B.

Recovery


C.

Containment


D.

Simulation


Expert Solution
Questions # 119:

A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers Which of the following solutions is the organization most likely to employ to further increase performance and availability?

Options:

A.

Load balancer


B.

Jump server


C.

Proxy server


D.

SD-WAN


Expert Solution
Questions # 120:

Which of the following is a benefit of vendor diversity?

Options:

A.

Patch availability


B.

Zero-day resiliency


C.

Secure configuration guide applicability


D.

Load balancing


Expert Solution
Viewing page 8 out of 16 pages
Viewing questions 106-120 out of questions