Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which of the following risk management strategies should an enterprise adopt first if a legacy application is critical to business operations and there are preventative controls that are not yet implemented?

Options:

A.

Mitigate


B.

Accept


C.

Transfer


D.

Avoid


Expert Solution
Questions # 122:

An unexpected and out-of-character email message from a Chief Executive Officer’s corporate account asked an employee to provide financial information and to change the recipient's contact number. Which of the following attack vectors is most likely being used?

Options:

A.

Business email compromise


B.

Phishing


C.

Brand impersonation


D.

Pretexting


Expert Solution
Questions # 123:

A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?

Options:

A.

Certification


B.

Inventory list


C.

Classification


D.

Proof of ownership


Expert Solution
Questions # 124:

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

Options:

A.

Key stretching


B.

Tokenization


C.

Data masking


D.

Salting


Expert Solution
Questions # 125:

A security analyst is creating the first draft of a network diagram for the company's new customer-facing payment application that will be hosted by a third-party cloud service

provider.

Question # 125

Question # 125


Expert Solution
Questions # 126:

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?

Options:

A.

Virus


B.

Trojan


C.

Spyware


D.

Ransomware


Expert Solution
Questions # 127:

A security administrator is reissuing a former employee's laptop. Which of the following is the best combination of data handling activities for the administrator to perform? (Select two).

Options:

A.

Data retention


B.

Certification


C.

Tokenization


D.

Classification


E.

Sanitization


F.

Enumeration


Expert Solution
Questions # 128:

A site reliability engineer is designing a recovery strategy that requires quick failover to an identical site if the primary facility goes down. Which of the following types of sites should the engineer consider?

Options:

A.

Recovery site


B.

Hot site


C.

Cold site


D.

Warm site


Expert Solution
Questions # 129:

Which of the following security control types does an acceptable use policy best represent?

Options:

A.

Detective


B.

Compensating


C.

Corrective


D.

Preventive


Expert Solution
Questions # 130:

Prior to implementing a design change, the change must go through multiple steps to ensure that it does not cause any security issues. Which of the following is most likely to be one of those steps?

Options:

A.

Management review


B.

Load testing


C.

Maintenance notifications


D.

Procedure updates


Expert Solution
Questions # 131:

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

Options:

A.

Insider


B.

Unskilled attacker


C.

Nation-state


D.

Hacktivist


Expert Solution
Questions # 132:

A company plans to secure its systems by:

Preventing users from sending sensitive data over corporate email

Restricting access to potentially harmful websites

Which of the following features should the company set up? (Select two).

Options:

A.

DLP software


B.

DNS filtering


C.

File integrity monitoring


D.

Stateful firewall


Expert Solution
Questions # 133:

Which of the following is a technical security control?

Options:

A.

Security guard


B.

Policy


C.

Fence


D.

Firewall


Expert Solution
Questions # 134:

Which of the following is a use of CVSS?

Options:

A.

To determine the cost associated with patching systems


B.

To identify unused ports and services that should be closed


C.

To analyze code for defects that could be exploited


D.

To prioritize the remediation of vulnerabilities


Expert Solution
Questions # 135:

An accountant is transferring information to a bank over FTP. Which of the following mitigations should the accountant use to protect the confidentiality of the data?

Options:

A.

Tokenization


B.

Data masking


C.

Encryption


D.

Obfuscation


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 121-135 out of questions