Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 8 out of 17 pages
Viewing questions 106-120 out of questions
Questions # 106:

Which of the following actions best addresses a vulnerability found on a company ' s web server?

Options:

A.

Patching


B.

Segmentation


C.

Decommissioning


D.

Monitoring


Expert Solution
Questions # 107:

A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?

Options:

A.

Partition


B.

Asymmetric


C.

Full disk


D.

Database


Expert Solution
Questions # 108:

Which of the following is a hardware-specific vulnerability?

Options:

A.

Firmware version


B.

Buffer overflow


C.

SQL injection


D.

Cross-site scripting


Expert Solution
Questions # 109:

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?

Options:

A.

MSA


B.

SLA


C.

BPA


D.

SOW


Expert Solution
Questions # 110:

An organization experiences a compromise in a cloud-hosted solution that contains customer information. Which of the following strategies will help determine the sensitivity level of the breach?

Options:

A.

Permission restrictions


B.

Tabletop exercise


C.

Data classification


D.

Asset inventory


Expert Solution
Questions # 111:

During a routine audit, an analyst discovers that a department uses software that was not vetted. Which threat is this?

Options:

A.

Espionage


B.

Data exfiltration


C.

Shadow IT


D.

Zero-day


Expert Solution
Questions # 112:

Attackers created a new domain name that looks similar to a popular file-sharing website. Which of the following threat vectors is being used?

Options:

A.

Watering-hole attack


B.

Brand impersonation


C.

Phishing


D.

Typosquatting


Expert Solution
Questions # 113:

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

Options:

A.

Bluetooth


B.

Wired


C.

NFC


D.

SCADA


Expert Solution
Questions # 114:

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

Options:

A.

Change management ticketing system


B.

Behavioral analyzer


C.

Collaboration platform


D.

Version control tool


Expert Solution
Questions # 115:

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

Options:

A.

SLA


B.

BPA


C.

NDA


D.

MOA


Expert Solution
Questions # 116:

A security analyst is prioritizing vulnerability scan results using a risk-based approach. Which of the following is the most efficient resource for the analyst to use?

Options:

A.

Business impact analysis


B.

Common Vulnerability Scoring System


C.

Risk register


D.

Exposure factor


Expert Solution
Questions # 117:

Which of the following best practices gives administrators a set period to perform changes to an operational system to ensure availability and minimize business impacts?

Options:

A.

Impact analysis


B.

Scheduled downtime


C.

Backout plan


D.

Change management boards


Expert Solution
Questions # 118:

An employee receives a text message from an unknown number claiming to be the company ' s Chief Executive Officer and asking the employee to purchase several gift cards. Which of the following types of attacks does this describe?

Options:

A.

Vishing


B.

Smishing


C.

Pretexting


D.

Phishing


Expert Solution
Questions # 119:

A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?

Options:

A.

Audit each domain administrator account weekly for password compliance.


B.

Implement a privileged access management solution.


C.

Create IDS policies to monitor domain controller access.


D.

Use Group Policy to enforce password expiration.


Expert Solution
Questions # 120:

At the start of a penetration test, the tester checks OSINT resources for information about the client environment. Which of the following types of reconnaissance is the tester performing?

Options:

A.

Active


B.

Passive


C.

Offensive


D.

Defensive


Expert Solution
Viewing page 8 out of 17 pages
Viewing questions 106-120 out of questions