New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 8 out of 15 pages
Viewing questions 106-120 out of questions
Questions # 106:

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

Question # 106

Which of the following is the most likely way a rogue device was allowed to connect?

Options:

A.

A user performed a MAC cloning attack with a personal device.


B.

A DMCP failure caused an incorrect IP address to be distributed


C.

An administrator bypassed the security controls for testing.


D.

DNS hijacking let an attacker intercept the captive portal traffic.


Expert Solution
Questions # 107:

Which of the following activities is the first stage in the incident response process?

Options:

A.

Detection


B.

Declaration


C.

Containment


D.

Vacation


Expert Solution
Questions # 108:

A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?

Options:

A.

SPF


B.

GPO


C.

NAC


D.

FIM


Expert Solution
Questions # 109:

A security analyst is reviewing logs to identify the destination of command-and-control traffic originating from a compromised device within the on-premises network. Which of the following is the best log to review?

Options:

A.

IDS


B.

Antivirus


C.

Firewall


D.

Application


Expert Solution
Questions # 110:

A hacker gained access to a system via a phishing attempt that was a direct result of a user clicking a suspicious link. The link laterally deployed ransomware, which laid dormant for multiple weeks, across the network. Which of the following would have mitigated the spread?

Options:

A.

IPS


B.

IDS


C.

WAF


D.

UAT


Expert Solution
Questions # 111:

One of a company's vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?

Options:

A.

Virtualization


B.

Firmware


C.

Application


D.

Operating system


Expert Solution
Questions # 112:

A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?

Options:

A.

Conduct an audit.


B.

Initiate a penetration test.


C.

Rescan the network.


D.

Submit a report.


Expert Solution
Questions # 113:

Which of the following activities should a systems administrator perform to quarantine a potentially infected system?

Options:

A.

Move the device into an air-gapped environment.


B.

Disable remote log-in through Group Policy.


C.

Convert the device into a sandbox.


D.

Remote wipe the device using the MDM platform.


Expert Solution
Questions # 114:

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

Options:

A.

Application


B.

Authentication


C.

DHCP


D.

Network


E.

Firewall


F.

Database


Expert Solution
Questions # 115:

An administrator is creating a secure method for a contractor to access a test environment. Which of the following would provide the contractor with the best access to the test environment?

Options:

A.

Application server


B.

Jump server


C.

RDP server


D.

Proxy server


Expert Solution
Questions # 116:

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Options:

A.

Secured zones


B.

Subject role


C.

Adaptive identity


D.

Threat scope reduction


Expert Solution
Questions # 117:

Which of the following would be the best solution to deploy a low-cost standby site that includes hardware and internet access?

Options:

A.

Recovery site


B.

Cold site


C.

Hot site


D.

Warm site


Expert Solution
Questions # 118:

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

Options:

A.

SLA


B.

BPA


C.

NDA


D.

MOA


Expert Solution
Questions # 119:

Visitors to a secured facility are required to check in with a photo ID and enter the facility through an access control vestibule Which of the following but describes this form of security control?

Options:

A.

Physical


B.

Managerial


C.

Technical


D.

Operational


Expert Solution
Questions # 120:

A penetration tester is testing the security of a building’s alarm system. Which type of penetration test is being conducted?

Options:

A.

Physical


B.

Defensive


C.

Integrated


D.

Continuous


Expert Solution
Viewing page 8 out of 15 pages
Viewing questions 106-120 out of questions