Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 9 out of 17 pages
Viewing questions 121-135 out of questions
Questions # 121:

A security analyst receives an alert that there was an attempt to download known malware. Which of the following actions would allow the best chance to analyze the malware?

Options:

A.

Review the IPS logs and determine which command-and-control IPs were blocked.


B.

Analyze application logs to see how the malware attempted to maintain persistence.


C.

Run vulnerability scans to check for systems and applications that are vulnerable to the malware.


D.

Obtain and execute the malware in a sandbox environment and perform packet captures.


Expert Solution
Questions # 122:

An organization is looking to optimize its environment and reduce the number of patches necessary for operating systems. Which of the following will best help to achieve this objective?

Options:

A.

Microservices


B.

Virtualization


C.

Real-time operating system


D.

Containers


Expert Solution
Questions # 123:

A company makes a change during the appropriate change window, but the unsuccessful change extends beyond the scheduled time and impacts customers. Which of the following would prevent this from reoccurring?

Options:

A.

User notification


B.

Change approval


C.

Risk analysis


D.

Backout plan


Expert Solution
Questions # 124:

Which of the following best describes the practice of preserving and documenting the handling of forensic evidence?

Options:

A.

Acquisition of evidence


B.

E-discovery


C.

Chain of custody


D.

Forensic tabletop exercises


Expert Solution
Questions # 125:

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

Options:

A.

To track the status of patch installations


B.

To find shadow IT cloud deployments


C.

To continuously monitor hardware inventory


D.

To hunt for active attackers in the network


Expert Solution
Questions # 126:

Which of the following is a risk of conducting a vulnerability assessment?

Options:

A.

A disruption of business operations


B.

Unauthorized access to the system


C.

Reports of false positives


D.

Finding security gaps in the system


Expert Solution
Questions # 127:

A security audit of an organization revealed that most of the IT staff members have domain administrator credentials and do not change the passwords regularly. Which of the following solutions should the security learn propose to resolve the findings in the most complete way?

Options:

A.

Creating group policies to enforce password rotation on domain administrator credentials


B.

Reviewing the domain administrator group, removing all unnecessary administrators, and rotating all passwords


C.

Integrating the domain administrator ' s group with an IdP and requiring SSO with MFA for all access


D.

Securing domain administrator credentials in a PAM vault and controlling access with role-based access control


Expert Solution
Questions # 128:

A university uses two different cloud solutions for storing student data. Which of the following does this scenario represent?

Options:

A.

Load balancing


B.

Parallel processing


C.

Platform diversity


D.

Clustering


Expert Solution
Questions # 129:

An employee emailed a new systems administrator a malicious web link and convinced the administrator to change the email server ' s password. The employee used this access to remove the mailboxes of key personnel. Which of the following security awareness concepts would help prevent this threat in the future?

Options:

A.

Recognizing phishing


B.

Providing situational awareness training


C.

Using password management


D.

Reviewing email policies


Expert Solution
Questions # 130:

A company plans to secure its systems by:

Preventing users from sending sensitive data over corporate email

Restricting access to potentially harmful websites

Which of the following features should the company set up? (Select two).

Options:

A.

DLP software


B.

DNS filtering


C.

File integrity monitoring


D.

Stateful firewall


Expert Solution
Questions # 131:

A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?

Options:

A.

Insurance


B.

Patching


C.

Segmentation


D.

Replacement


Expert Solution
Questions # 132:

Which of the following will harden access to a new database system? (Select two)

Options:

A.

Jump server


B.

NIDS


C.

Monitoring


D.

Proxy server


E.

Host-based firewall


F.

WAF


Expert Solution
Questions # 133:

The physical security team at a company receives reports that employees are not displaying their badges. The team also observes employees tailgating at controlled entrances. Which of the following topics will the security team most likely emphasize in upcoming security training?

Options:

A.

Social engineering


B.

Situational awareness


C.

Phishing


D.

Acceptable use policy


Expert Solution
Questions # 134:

A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?

Options:

A.

Wireless access point


B.

Switch


C.

Firewall


D.

NAC


Expert Solution
Questions # 135:

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Options:

A.

Secured zones


B.

Subject role


C.

Adaptive identity


D.

Threat scope reduction


Expert Solution
Viewing page 9 out of 17 pages
Viewing questions 121-135 out of questions