Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 106-120 out of questions
Questions # 106:

A bank set up a new server that contains customers' Pll. Which of the following should the bank use to make sure the sensitive data is not modified?

Options:

A.

Full disk encryption


B.

Network access control


C.

File integrity monitoring


D.

User behavior analytics


Expert Solution
Questions # 107:

The Cruel Information Security Officer (CISO) asks a security analyst to install an OS update to a production VM that has a 99% uptime SLA. The CISO tells me analyst the installation must be done as quickly as possible. Which of the following courses of action should the security analyst take first?

Options:

A.

Log in to the server and perform a health check on the VM.


B.

Install the patch Immediately.


C.

Confirm that the backup service is running.


D.

Take a snapshot of the VM.


Expert Solution
Questions # 108:

Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?

Options:

A.

Compliance reporting


B.

GDPR


C.

Due diligence


D.

Attestation


Expert Solution
Questions # 109:

An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

Options:

A.

Compromise


B.

Retention


C.

Analysis


D.

Transfer


E.

Inventory


Expert Solution
Questions # 110:

Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?

Options:

A.

Availability


B.

Accounting


C.

Authentication


D.

Authorization


Expert Solution
Questions # 111:

During a SQL update of a database, a temporary field that was created was replaced by an attacker in order to allow access to the system. Which of the following best describes this type of vulnerability?

Options:

A.

Race condition


B.

Memory injection


C.

Malicious update


D.

Side loading


Expert Solution
Questions # 112:

Which of the following actions would reduce the number of false positives for an analyst to manually review?

Options:

A.

Create playbooks as part of a SOAR platform


B.

Redefine the patch management process


C.

Replace an EDR tool with an XDR solution


D.

Disable AV heuristics scanning


Expert Solution
Questions # 113:

In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following best describes the security engineer's response?

Options:

A.

Risk tolerance


B.

Risk acceptance


C.

Risk importance


D.

Risk appetite


Expert Solution
Questions # 114:

A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?

Options:

A.

Exemption


B.

Exception


C.

Avoid


D.

Transfer


Expert Solution
Questions # 115:

An enterprise security team is researching a new security architecture to better protect the company's networks and applications against the latest cyberthreats. The company has a fully remote workforce. The solution should be highly redundant and enable users to connect to a VPN with an integrated, software-based firewall. Which of the following solutions meets these requirements?

Options:

A.

IPS


B.

SIEM


C.

SASE


D.

CASB


Expert Solution
Questions # 116:

A business needs a recovery site but does not require immediate failover. The business also wants to reduce the workload required to recover from an outage. Which of the following recovery sites is the best option?

Options:

A.

Hot


B.

Cold


C.

Warm


D.

Geographically dispersed


Expert Solution
Questions # 117:

After a series of account compromises and credential misuse, a company hires a security manager to develop a security program. Which of the following steps should the security manager take first to increase security awareness?

Options:

A.

Evaluate tools that identify risky behavior and distribute reports on the findings.


B.

Send quarterly newsletters that explain the importance of password management.


C.

Develop phishing campaigns and notify the management team of any successes.


D.

Update policies and handbooks to ensure all employees are informed of the new procedures.


Expert Solution
Questions # 118:

A security engineer at a large company needs to enhance IAM to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?

Options:

A.

Role-based


B.

Time-of-day restrictions


C.

Least privilege


D.

Biometric authentication


Expert Solution
Questions # 119:

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

Options:

A.

Bluetooth


B.

Wired


C.

NFC


D.

SCADA


Expert Solution
Questions # 120:

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

Options:

A.

Public key infrastructure


B.

Open public ledger


C.

Public key encryption


D.

Key escrow


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 106-120 out of questions