New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions
Questions # 121:

A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?

Options:

A.

To reduce implementation cost


B.

To identify complexity


C.

To remediate technical debt


D.

To prevent a single point of failure


Expert Solution
Questions # 122:

A company is implementing a policy to allow employees to use their personal equipment for work. However, the company wants to ensure that only company-approved applications can be installed. Which of the following addresses this concern?

Options:

A.

MDM


B.

Containerization


C.

DLP


D.

FIM


Expert Solution
Questions # 123:

Which of the following is the best method to reduce the attack surface of an enterprise network?

Options:

A.

Disable unused network services on servers.


B.

Use port security for wired connections.


C.

Change default passwords for network printers.


D.

Create a guest wireless network for visitors.


Expert Solution
Questions # 124:

Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?

Options:

A.

Availability


B.

Non-repudiation


C.

Integrity


D.

Confidentiality


Expert Solution
Questions # 125:

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated:

“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”

Which of the following are the best responses to this situation? (Choose two).

Options:

A.

Cancel current employee recognition gift cards.


B.

Add a smishing exercise to the annual company training.


C.

Issue a general email warning to the company.


D.

Have the CEO change phone numbers.


E.

Conduct a forensic investigation on the CEO's phone.


F.

Implement mobile device management.


Expert Solution
Questions # 126:

An administrator has identified and fingerprinted specific files that will generate an alert if an attempt is made to email these files outside of the organization. Which of the following best describes the tool the administrator is using?

Options:

A.

DLP


B.

SNMP traps


C.

SCAP


D.

IPS


Expert Solution
Questions # 127:

A systems administrate wants to implement a backup solution. the solution needs to allow recovery of the entire system, including the operating system, in case of a disaster. Which of the following backup types should the administrator consider?

Options:

A.

Incremental


B.

Storage area network


C.

Differential


D.

Image


Expert Solution
Questions # 128:

A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO's report?

Options:

A.

Insider threat


B.

Hacktivist


C.

Nation-state


D.

Organized crime


Expert Solution
Questions # 129:

A security analyst is reviewing logs and discovers the following:

Question # 129

Which of the following should be used lo best mitigate this type of attack?

Options:

A.

Input sanitization


B.

Secure cookies


C.

Static code analysis


D.

Sandboxing


Expert Solution
Questions # 130:

A company is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will most likely be classified? (Select two).

Options:

A.

Private


B.

Confidential


C.

Public


D.

Operational


E.

Urgent


F.

Restricted


Expert Solution
Questions # 131:

A security administrator protects passwords by using hashing. Which of the following best describes what the administrator is doing?

Options:

A.

Adding extra characters at the end to increase password length


B.

Generating a token to make the passwords temporal


C.

Using mathematical algorithms to make passwords unique


D.

Creating a rainbow table to protect passwords in a list


Expert Solution
Questions # 132:

A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?

Options:

A.

IPS


B.

Firewall


C.

ACL


D.

Windows security


Expert Solution
Questions # 133:

A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the file's creator. Which of the following actions would most likely give the security analyst the information required?

Options:

A.

Obtain the file's SHA-256 hash.


B.

Use hexdump on the file's contents.


C.

Check endpoint logs.


D.

Query the file's metadata.


Expert Solution
Questions # 134:

Which solution is most likely used in the financial industry to mask sensitive data?

Options:

A.

Tokenization


B.

Hashing


C.

Salting


D.

Steganography


Expert Solution
Questions # 135:

During a SQL update of a database, a temporary field used as part of the update sequence was modified by an attacker before the update completed in order to allow access to the system. Which of the following best describes this type of vulnerability?

Options:

A.

Race condition


B.

Memory injection


C.

Malicious update


D.

Side loading


Expert Solution
Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions