ExamGecko
Home Home / CompTIA / SY0-701

CompTIA SY0-701 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











Which of the following exercises should an organization use to improve its incident response process?

A.
Tabletop
A.
Tabletop
Answers
B.
Replication
B.
Replication
Answers
C.
Failover
C.
Failover
Answers
D.
Recovery
D.
Recovery
Answers
Suggested answer: A

Explanation:

A tabletop exercise is a simulated scenario that tests the organization's incident response plan and procedures. It involves key stakeholders and decision-makers who discuss their roles and actions in response to a hypothetical incident. It can help identify gaps, weaknesses, and improvement areas in the incident response process.It can also enhance communication, coordination, and collaboration among the participants.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 5251

Which of the following is used to validate a certificate when it is presented to a user?

A.
OCSP
A.
OCSP
Answers
B.
CSR
B.
CSR
Answers
C.
CA
C.
CA
Answers
D.
CRC
D.
CRC
Answers
Suggested answer: A

Explanation:

OCSP stands for Online Certificate Status Protocol. It is a protocol that allows applications to check the revocation status of a certificate in real-time. It works by sending a query to an OCSP responder, which is a server that maintains a database of revoked certificates. The OCSP responder returns a response that indicates whether the certificate is valid, revoked, or unknown.OCSP is faster and more efficient than downloading and parsing Certificate Revocation Lists (CRLs), which are large files that contain the serial numbers of all revoked certificates issued by a Certificate Authority (CA).Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 3371

HOTSPOT

You are security administrator investigating a potential infection on a network.

Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.


Question 103
Correct answer: Question 103

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

A.
VM escape
A.
VM escape
Answers
B.
SQL injection
B.
SQL injection
Answers
C.
Buffer overflow
C.
Buffer overflow
Answers
D.
Race condition
D.
Race condition
Answers
Suggested answer: C

Explanation:

A buffer overflow is a vulnerability that occurs when an application writes more data to a memory buffer than it can hold, causing the excess data to overwrite adjacent memory locations. A register is a small storage area in the CPU that holds temporary data or instructions. An attacker can exploit a buffer overflow to overwrite a register with a malicious address that points to a shellcode, which is a piece of code that gives the attacker control over the system. By doing so, the attacker can bypass the normal execution flow of the application and execute arbitrary commands.

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

A.
Segmentation
A.
Segmentation
Answers
B.
Isolation
B.
Isolation
Answers
C.
Hardening
C.
Hardening
Answers
D.
Decommissioning
D.
Decommissioning
Answers
Suggested answer: B

Explanation:


Which of the following describes the process of concealing code or text inside a graphical image?

A.
Symmetric encryption
A.
Symmetric encryption
Answers
B.
Hashing
B.
Hashing
Answers
C.
Data masking
C.
Data masking
Answers
D.
Steganography
D.
Steganography
Answers
Suggested answer: D

Explanation:

Steganography is the process of hiding information within another medium, such as an image, audio, video, or text file. The hidden information is not visible or noticeable to the casual observer, and can only be extracted by using a specific technique or key.Steganography can be used for various purposes, such as concealing secret messages, watermarking, or evading detection by antivirus software12

1: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 5: Cryptography and PKI, page 2332: CompTIA Security+ Certification Kit: Exam SY0-701, 7th Edition, Chapter 5: Cryptography and PKI, page 235

After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?

A.
Retain the emails between the security team and affected customers for 30 days.
A.
Retain the emails between the security team and affected customers for 30 days.
Answers
B.
Retain any communications related to the security breach until further notice.
B.
Retain any communications related to the security breach until further notice.
Answers
C.
Retain any communications between security members during the breach response.
C.
Retain any communications between security members during the breach response.
Answers
D.
Retain all emails from the company to affected customers for an indefinite period of time.
D.
Retain all emails from the company to affected customers for an indefinite period of time.
Answers
Suggested answer: B

Explanation:

A legal hold (also known as a litigation hold) is a notification sent from an organization's legal team to employees instructing them not to delete electronically stored information (ESI) or discard paper documents that may be relevant to a new or imminent legal case. A legal hold is intended to preserve evidence and prevent spoliation, which is the intentional or negligent destruction of evidence that could harm a party's case.A legal hold can be triggered by various events, such as a lawsuit, a regulatory investigation, or a subpoena12

In this scenario, the company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit filed by the customers after the company was compromised. This means that the security team will most likely be required to retain any communications related to the security breach until further notice. This could include emails, instant messages, reports, logs, memos, or any other documents that could be relevant to the lawsuit. The security team should also inform the relevant custodians (the employees who have access to or control over the ESI) of their preservation obligations and monitor their compliance.The security team should also document the legal hold process and its scope, as well as take steps to protect the ESI from alteration, deletion, or loss34

1: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 6: Risk Management, page 3032: CompTIA Security+ Certification Kit: Exam SY0-701, 7th Edition, Chapter 6: Risk Management, page 3053: Legal Hold (Litigation Hold) - The Basics of E-Discovery - Exterro54: The Legal Implications and Consequences of a Data Breach6

A network manager wants to protect the company's VPN by implementing multifactor authentication that uses:

. Something you know

. Something you have

. Something you are

Which of the following would accomplish the manager's goal?

A.
Domain name, PKI, GeolP lookup
A.
Domain name, PKI, GeolP lookup
Answers
B.
VPN IP address, company ID, facial structure
B.
VPN IP address, company ID, facial structure
Answers
C.
Password, authentication token, thumbprint
C.
Password, authentication token, thumbprint
Answers
D.
Company URL, TLS certificate, home address
D.
Company URL, TLS certificate, home address
Answers
Suggested answer: C

Explanation:

The correct answer is C. Password, authentication token, thumbprint. This combination of authentication factors satisfies the manager's goal of implementing multifactor authentication that uses something you know, something you have, and something you are.

Something you know is a type of authentication factor that relies on the user's knowledge of a secret or personal information, such as a password, a PIN, or a security question.A password is a common example of something you know that can be used to access a VPN12

Something you have is a type of authentication factor that relies on the user's possession of a physical object or device, such as a smart card, a token, or a smartphone.An authentication token is a common example of something you have that can be used to generate a one-time password (OTP) or a code that can be used to access a VPN12

Something you are is a type of authentication factor that relies on the user's biometric characteristics, such as a fingerprint, a face, or an iris.A thumbprint is a common example of something you are that can be used to scan and verify the user's identity to access a VPN12

1: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 4: Identity and Access Management, page 1772: CompTIA Security+ Certification Kit: Exam SY0-701, 7th Edition, Chapter 4: Identity and Access Management, page 179

A security manager created new documentation to use in response to various types of security incidents. Which of the following is the next step the manager should take?

A.
Set the maximum data retention policy.
A.
Set the maximum data retention policy.
Answers
B.
Securely store the documents on an air-gapped network.
B.
Securely store the documents on an air-gapped network.
Answers
C.
Review the documents' data classification policy.
C.
Review the documents' data classification policy.
Answers
D.
Conduct a tabletop exercise with the team.
D.
Conduct a tabletop exercise with the team.
Answers
Suggested answer: D

Explanation:

A tabletop exercise is a simulated scenario that tests the effectiveness of a security incident response plan. It involves gathering the relevant stakeholders and walking through the steps of the plan, identifying any gaps or issues that need to be addressed. A tabletop exercise is a good way to validate the documentation created by the security manager and ensure that the team is prepared for various types of security incidents.

Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked.

Which of the following changes would allow users to access the site?

A.
Creating a firewall rule to allow HTTPS traffic
A.
Creating a firewall rule to allow HTTPS traffic
Answers
B.
Configuring the IPS to allow shopping
B.
Configuring the IPS to allow shopping
Answers
C.
Tuning the DLP rule that detects credit card data
C.
Tuning the DLP rule that detects credit card data
Answers
D.
Updating the categorization in the content filter
D.
Updating the categorization in the content filter
Answers
Suggested answer: D

Explanation:

A content filter is a device or software that blocks or allows access to web content based on predefined rules or categories. In this case, the new retail website is mistakenly categorized as gambling by the content filter, which prevents users from accessing it. To resolve this issue, the content filter's categorization needs to be updated to reflect the correct category of the website, such as shopping or retail. This will allow the content filter to allow access to the website instead of blocking it.

Total 350 questions
Go to page: of 35