ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 11

Add to Whishlist

List of questions

Question 101

Report Export Collapse

Which of the following exercises should an organization use to improve its incident response process?

Tabletop
Tabletop
Replication
Replication
Failover
Failover
Recovery
Recovery
Suggested answer: A
Explanation:

A tabletop exercise is a simulated scenario that tests the organization's incident response plan and procedures. It involves key stakeholders and decision-makers who discuss their roles and actions in response to a hypothetical incident. It can help identify gaps, weaknesses, and improvement areas in the incident response process.It can also enhance communication, coordination, and collaboration among the participants.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 5251

asked 02/10/2024
Adam Beke
42 questions

Question 102

Report Export Collapse

Which of the following is used to validate a certificate when it is presented to a user?

OCSP
OCSP
CSR
CSR
CA
CA
CRC
CRC
Suggested answer: A
Explanation:

OCSP stands for Online Certificate Status Protocol. It is a protocol that allows applications to check the revocation status of a certificate in real-time. It works by sending a query to an OCSP responder, which is a server that maintains a database of revoked certificates. The OCSP responder returns a response that indicates whether the certificate is valid, revoked, or unknown.OCSP is faster and more efficient than downloading and parsing Certificate Revocation Lists (CRLs), which are large files that contain the serial numbers of all revoked certificates issued by a Certificate Authority (CA).Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 3371

asked 02/10/2024
Rosalba Scalera
57 questions

Question 103

Report Export Collapse

HOTSPOT

You are security administrator investigating a potential infection on a network.

Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.

CompTIA SY0-701 image Question 103 98796 10022024175414000000

CompTIA SY0-701 image Question 103 98796 10022024175414000000

CompTIA SY0-701 image Question 103 98796 10022024175414000000

CompTIA SY0-701 image Question 103 98796 10022024175414000000

CompTIA SY0-701 image Question 103 98796 10022024175414000000

CompTIA SY0-701 image Question 103 98796 10022024175414000000


CompTIA SY0-701 image Question 103 98796 10022024055414000
Correct answer: CompTIA SY0-701 image answer Question 103 98796 10022024055414000
asked 02/10/2024
Jonathan Tang
46 questions

Question 104

Report Export Collapse

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

VM escape
VM escape
SQL injection
SQL injection
Buffer overflow
Buffer overflow
Race condition
Race condition
Suggested answer: C
Explanation:

A buffer overflow is a vulnerability that occurs when an application writes more data to a memory buffer than it can hold, causing the excess data to overwrite adjacent memory locations. A register is a small storage area in the CPU that holds temporary data or instructions. An attacker can exploit a buffer overflow to overwrite a register with a malicious address that points to a shellcode, which is a piece of code that gives the attacker control over the system. By doing so, the attacker can bypass the normal execution flow of the application and execute arbitrary commands.

asked 02/10/2024
Lucile Jeanneret
44 questions

Question 105

Report Export Collapse

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

Segmentation
Segmentation
Isolation
Isolation
Hardening
Hardening
Decommissioning
Decommissioning
Suggested answer: B
Explanation:


asked 02/10/2024
hajar mechrany
33 questions

Question 106

Report Export Collapse

Which of the following describes the process of concealing code or text inside a graphical image?

Symmetric encryption
Symmetric encryption
Hashing
Hashing
Data masking
Data masking
Steganography
Steganography
Suggested answer: D
Explanation:

Steganography is the process of hiding information within another medium, such as an image, audio, video, or text file. The hidden information is not visible or noticeable to the casual observer, and can only be extracted by using a specific technique or key.Steganography can be used for various purposes, such as concealing secret messages, watermarking, or evading detection by antivirus software12

1: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 5: Cryptography and PKI, page 2332: CompTIA Security+ Certification Kit: Exam SY0-701, 7th Edition, Chapter 5: Cryptography and PKI, page 235

asked 02/10/2024
Alessandro Cristofori
42 questions

Question 107

Report Export Collapse

After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?

Retain the emails between the security team and affected customers for 30 days.
Retain the emails between the security team and affected customers for 30 days.
Retain any communications related to the security breach until further notice.
Retain any communications related to the security breach until further notice.
Retain any communications between security members during the breach response.
Retain any communications between security members during the breach response.
Retain all emails from the company to affected customers for an indefinite period of time.
Retain all emails from the company to affected customers for an indefinite period of time.
Suggested answer: B
Explanation:

A legal hold (also known as a litigation hold) is a notification sent from an organization's legal team to employees instructing them not to delete electronically stored information (ESI) or discard paper documents that may be relevant to a new or imminent legal case. A legal hold is intended to preserve evidence and prevent spoliation, which is the intentional or negligent destruction of evidence that could harm a party's case.A legal hold can be triggered by various events, such as a lawsuit, a regulatory investigation, or a subpoena12

In this scenario, the company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit filed by the customers after the company was compromised. This means that the security team will most likely be required to retain any communications related to the security breach until further notice. This could include emails, instant messages, reports, logs, memos, or any other documents that could be relevant to the lawsuit. The security team should also inform the relevant custodians (the employees who have access to or control over the ESI) of their preservation obligations and monitor their compliance.The security team should also document the legal hold process and its scope, as well as take steps to protect the ESI from alteration, deletion, or loss34

1: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 6: Risk Management, page 3032: CompTIA Security+ Certification Kit: Exam SY0-701, 7th Edition, Chapter 6: Risk Management, page 3053: Legal Hold (Litigation Hold) - The Basics of E-Discovery - Exterro54: The Legal Implications and Consequences of a Data Breach6

asked 02/10/2024
Manuela Kays
39 questions

Question 108

Report Export Collapse

A network manager wants to protect the company's VPN by implementing multifactor authentication that uses:

. Something you know

. Something you have

. Something you are

Which of the following would accomplish the manager's goal?

Domain name, PKI, GeolP lookup
Domain name, PKI, GeolP lookup
VPN IP address, company ID, facial structure
VPN IP address, company ID, facial structure
Password, authentication token, thumbprint
Password, authentication token, thumbprint
Company URL, TLS certificate, home address
Company URL, TLS certificate, home address
Suggested answer: C
Explanation:

The correct answer is C. Password, authentication token, thumbprint. This combination of authentication factors satisfies the manager's goal of implementing multifactor authentication that uses something you know, something you have, and something you are.

Something you know is a type of authentication factor that relies on the user's knowledge of a secret or personal information, such as a password, a PIN, or a security question.A password is a common example of something you know that can be used to access a VPN12

Something you have is a type of authentication factor that relies on the user's possession of a physical object or device, such as a smart card, a token, or a smartphone.An authentication token is a common example of something you have that can be used to generate a one-time password (OTP) or a code that can be used to access a VPN12

Something you are is a type of authentication factor that relies on the user's biometric characteristics, such as a fingerprint, a face, or an iris.A thumbprint is a common example of something you are that can be used to scan and verify the user's identity to access a VPN12

1: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 4: Identity and Access Management, page 1772: CompTIA Security+ Certification Kit: Exam SY0-701, 7th Edition, Chapter 4: Identity and Access Management, page 179

asked 02/10/2024
EDDIE LIN
49 questions

Question 109

Report Export Collapse

A security manager created new documentation to use in response to various types of security incidents. Which of the following is the next step the manager should take?

Set the maximum data retention policy.
Set the maximum data retention policy.
Securely store the documents on an air-gapped network.
Securely store the documents on an air-gapped network.
Review the documents' data classification policy.
Review the documents' data classification policy.
Conduct a tabletop exercise with the team.
Conduct a tabletop exercise with the team.
Suggested answer: D
Explanation:

A tabletop exercise is a simulated scenario that tests the effectiveness of a security incident response plan. It involves gathering the relevant stakeholders and walking through the steps of the plan, identifying any gaps or issues that need to be addressed. A tabletop exercise is a good way to validate the documentation created by the security manager and ensure that the team is prepared for various types of security incidents.

asked 02/10/2024
GREGORY DROUIN
39 questions

Question 110

Report Export Collapse

Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked.

Which of the following changes would allow users to access the site?

Creating a firewall rule to allow HTTPS traffic
Creating a firewall rule to allow HTTPS traffic
Configuring the IPS to allow shopping
Configuring the IPS to allow shopping
Tuning the DLP rule that detects credit card data
Tuning the DLP rule that detects credit card data
Updating the categorization in the content filter
Updating the categorization in the content filter
Suggested answer: D
Explanation:

A content filter is a device or software that blocks or allows access to web content based on predefined rules or categories. In this case, the new retail website is mistakenly categorized as gambling by the content filter, which prevents users from accessing it. To resolve this issue, the content filter's categorization needs to be updated to reflect the correct category of the website, such as shopping or retail. This will allow the content filter to allow access to the website instead of blocking it.

asked 02/10/2024
Sam K
35 questions
Total 517 questions
Go to page: of 52
Search

Related questions