Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 9 out of 16 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which of the following security controls is a company implementing by deploying HIPS? (Select two)

Options:

A.

Directive


B.

Preventive


C.

Physical


D.

Corrective


E.

Compensating


F.

Detective


Expert Solution
Questions # 122:

Which of the following would best ensure a controlled version release of a new software application?

Options:

A.

Business continuity planning


B.

Quantified risk analysis


C.

Static code analysis


D.

Change management procedures


Expert Solution
Questions # 123:

Which of the following best explains how open service ports increase an organization's attack surface?

Options:

A.

They are commonly overlooked by endpoint antivirus tools during scans.


B.

They can make the company’s remote entry point available to the internet.


C.

They enable automatic application updates to reduce vulnerability windows.


D.

They can expose unnecessary services to unauthorized access if not properly restricted.


Expert Solution
Questions # 124:

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

Options:

A.

Data in use


B.

Data in transit


C.

Geographic restrictions


D.

Data sovereignty


Expert Solution
Questions # 125:

An organization recently started hosting a new service that customers access through a web portal. A security engineer needs to add to the existing security devices a new solution to protect this new service. Which of the following is the engineer most likely to deploy?

Options:

A.

Layer 4 firewall


B.

NGFW


C.

WAF


D.

UTM


Expert Solution
Questions # 126:

The management team notices that new accounts that are set up manually do not always have correct access or permissions.

Which of the following automation techniques should a systems administrator use to streamline account creation?

Options:

A.

Guard rail script


B.

Ticketing workflow


C.

Escalation script


D.

User provisioning script


Expert Solution
Questions # 127:

A security analyst is creating the first draft of a network diagram for the company's new customer-facing payment application that will be hosted by a third-party cloud service

provider.

Question # 127

Question # 127


Expert Solution
Questions # 128:

A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?

Options:

A.

Insurance


B.

Patching


C.

Segmentation


D.

Replacement


Expert Solution
Questions # 129:

A company needs to determine whether authentication weaknesses in a customer-facing web application exist. Which of the following is the best technique to use?

Options:

A.

Static analysis


B.

Packet capture


C.

Agent-based scanning


D.

Dynamic analysis


E.

Network-based scanning


Expert Solution
Questions # 130:

An employee used a company's billing system to issue fraudulent checks. The administrator is looking for evidence of other occurrences of this activity. Which of the following should the administrator examine?

Options:

A.

Application logs


B.

Vulnerability scanner logs


C.

IDS/IPS logs


D.

Firewall logs


Expert Solution
Questions # 131:

Which of the following should be used to ensure that a new software release has not been modified before reaching the user?

Options:

A.

Tokenization


B.

Encryption


C.

Hashing


D.

Obfuscation


Expert Solution
Questions # 132:

Which of the following is a directive managerial control?

Options:

A.

Acceptable use policy


B.

Login warning banner


C.

Master service agreement


D.

No trespassing sign


Expert Solution
Questions # 133:

An office wants to install a Wi-Fi network. The security team must ensure a secure design. The access points will be more powerful and use WPA3 with a 16-character randomized key. Which of the following should the security team do next?

Options:

A.

Create a heat map of the building perimeter.


B.

Deploy IPSec tunnels from each access point to the controller.


C.

Enable WPA2-PSK with a 24-character randomized key.


D.

Disable SSH administration on all access points.


Expert Solution
Questions # 134:

Which of the following allows a systems administrator to tune permissions for a file?

Options:

A.

Patching


B.

Access control list


C.

Configuration enforcement


D.

Least privilege


Expert Solution
Questions # 135:

A security team is setting up a new environment for hosting the organization's on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?

Options:

A.

Visualization and isolation of resources


B.

Network segmentation


C.

Data encryption


D.

Strong authentication policies


Expert Solution
Viewing page 9 out of 16 pages
Viewing questions 121-135 out of questions