Pass the CompTIA CompTIA Security+ SY0-701 Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which of the following is the best reason to complete an audit in a banking environment?

Options:

A.

Regulatory requirement


B.

Organizational change


C.

Self-assessment requirement


D.

Service-level requirement


Expert Solution
Questions # 122:

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company's reliance on open-source libraries?

Options:

A.

Buffer overflow


B.

SQL injection


C.

Cross-site scripting


D.

Zero day


Expert Solution
Questions # 123:

Which of the following must be considered when designing a high-availability network? (Choose two).

Options:

A.

Ease of recovery


B.

Ability to patch


C.

Physical isolation


D.

Responsiveness


E.

Attack surface


F.

Extensible authentication


Expert Solution
Questions # 124:

Which of the following topics would most likely be included within an organization's SDLC?

Options:

A.

Service-level agreements


B.

Information security policy


C.

Penetration testing methodology


D.

Branch protection requirements


Expert Solution
Questions # 125:

An administrator is Investigating an incident and discovers several users’ computers were Infected with malware after viewing files mat were shared with them. The administrator discovers no degraded performance in the infected machines and an examination of the log files does not show excessive failed logins. Which of the following attacks Is most likely the cause of the malware?

Options:

A.

Malicious flash drive


B.

Remote access Trojan


C.

Brute-forced password


D.

Cryptojacking


Expert Solution
Questions # 126:

Which of the following best describe a penetration test that resembles an actual external attach?

Options:

A.

Known environment


B.

Partially known environment


C.

Bug bounty


D.

Unknown environment


Expert Solution
Questions # 127:

Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?

Options:

A.

Unidentified removable devices


B.

Default network device credentials


C.

Spear phishing emails


D.

Impersonation of business units through typosquatting


Expert Solution
Questions # 128:

Which of the following is die most important security concern when using legacy systems to provide production service?

Options:

A.

Instability


B.

Lack of vendor support


C.

Loss of availability


D.

Use of insecure protocols


Expert Solution
Questions # 129:

Which of the following is required for an organization to properly manage its restore process in the event of system failure?

Options:

A.

IRP


B.

DRP


C.

RPO


D.

SDLC


Expert Solution
Questions # 130:

Which of the following would a security administrator use to comply with a secure baseline during a patch update?

Options:

A.

Information security policy


B.

Service-level expectations


C.

Standard operating procedure


D.

Test result report


Expert Solution
Questions # 131:

An organization has too many variations of a single operating system and needs to standardize the arrangement prior to pushing the system image to users. Which of the following should the organization implement first?

Options:

A.

Standard naming convention


B.

Mashing


C.

Network diagrams


D.

Baseline configuration


Expert Solution
Questions # 132:

An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.

Which of the following best describes the user’s activity?

Options:

A.

Penetration testing


B.

Phishing campaign


C.

External audit


D.

Insider threat


Expert Solution
Questions # 133:

A company has a website in a server cluster. One server is experiencing very high usage, while others are nearly unused. Which of the following should the company configure to help distribute traffic quickly?

Options:

A.

Server multiprocessing


B.

Warm site


C.

Load balancer


D.

Proxy server


Expert Solution
Questions # 134:

A security officer is implementing a security awareness program and is placing security-themed posters around the building and is assigning online user training. Which of the following would the security officer most likely implement?

Options:

A.

Password policy


B.

Access badges


C.

Phishing campaign


D.

Risk assessment


Expert Solution
Questions # 135:

Which of the following involves an attempt to take advantage of database misconfigurations?

Options:

A.

Buffer overflow


B.

SQL injection


C.

VM escape


D.

Memory injection


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions