Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?

Options:

A.

Send out periodic security reminders.


B.

Update the content of new hire documentation.


C.

Modify the content of recurring training.D Implement a phishing campaign


Expert Solution
Questions # 107:

A security analyst is reviewing logs and discovers the following:

Question # 107

Which of the following should be used lo best mitigate this type of attack?

Options:

A.

Input sanitization


B.

Secure cookies


C.

Static code analysis


D.

Sandboxing


Expert Solution
Questions # 108:

Which of the following would be the best way to test resiliency in the event of a primary power failure?

Options:

A.

Parallel processing


B.

Tabletop exercise


C.

Simulation testing


D.

Production failover


Expert Solution
Questions # 109:

Which of the following cryptographic solutions protects data at rest?

Options:

A.

Digital signatures


B.

Full disk encryption


C.

Private key


D.

Steganography


Expert Solution
Questions # 110:

While investigating a possible incident, a security analyst discovers the following log entries:

67.118.34.157 ----- [28/Jul/2022:10:26:59 -0300] "GET /query.php?q-wireless%20headphones / HTTP/1.0" 200 12737

132.18.222.103 ----[28/Jul/2022:10:27:10 -0300] "GET /query.php?q=123 INSERT INTO users VALUES('temp', 'pass123')# / HTTP/1.0" 200 935

12.45.101.121 ----- [28/Jul/2022:10:27:22 -0300] "GET /query.php?q=mp3%20players I HTTP/1.0" 200 14650

Which of the following should the analyst do first?

Options:

A.

Implement a WAF


B.

Disable the query .php script


C.

Block brute-force attempts on temporary users


D.

Check the users table for new accounts


Expert Solution
Questions # 111:

Which of the following provides the details about the terms of a test with a third-party penetration tester?

Options:

A.

Rules of engagement


B.

Supply chain analysis


C.

Right to audit clause


D.

Due diligence


Expert Solution
Questions # 112:

Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?

Options:

A.

Authorization


B.

Identification


C.

Non-repudiation


D.

Authentication


Expert Solution
Questions # 113:

An analyst identifies that multiple users have the same passwords, but the hashes appear to be completely different. Which of the following most likely explains this issue?

Options:

A.

Data masking


B.

Salting


C.

Key escrow


D.

Tokenization


Expert Solution
Questions # 114:

Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?

Options:

A.

SIEM


B.

WAF


C.

Network taps


D.

IDS


Expert Solution
Questions # 115:

Which of the following makes Infrastructure as Code (IaC) a preferred security architecture over traditional infrastructure models?

Options:

A.

Common attacks are less likely to be effective.


B.

Configuration can be better managed and replicated.


C.

Outsourcing to a third party with more expertise in network defense is possible.


D.

Optimization can occur across a number of computing instances.


Expert Solution
Questions # 116:

A customer has a contract with a CSP and wants to identify which controls should be implemented in the IaaS enclave. Which of the following is most likely to contain this information?

Options:

A.

Statement of work


B.

Responsibility matrix


C.

Service-level agreement


D.

Master service agreement


Expert Solution
Questions # 117:

An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?

Options:

A.

ACL


B.

DLP


C.

IDS


D.

IPS


Expert Solution
Questions # 118:

An organization has learned that its data is being exchanged on the dark web. The CIO

has requested that you investigate and implement the most secure solution to protect employee accounts.

INSTRUCTIONS

Review the data to identify weak security practices and provide the most appropriate

security solution to meet the CIO's requirements.

Question # 118


Expert Solution
Questions # 119:

Sine© a recent upgrade (o a WLAN infrastructure, several mobile users have been unable to access the internet from the lobby. The networking team performs a heat map survey of the building and finds several WAPs in the area. The WAPs are using similar frequencies with high power settings. Which of the following installation considerations should the security team evaluate next?

Options:

A.

Channel overlap


B.

Encryption type


C.

New WLAN deployment


D.

WAP placement


Expert Solution
Questions # 120:

Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

Options:

A.

Configure all systems to log scheduled tasks.


B.

Collect and monitor all traffic exiting the network.


C.

Block traffic based on known malicious signatures.


D.

Install endpoint management software on all systems.


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions