ExamGecko
Home Home / CompTIA / SY0-701

CompTIA SY0-701 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would be the best ways to ensure only authorized personnel can access a secure facility? (Select two).

A.
Fencing
A.
Fencing
Answers
B.
Video surveillance
B.
Video surveillance
Answers
C.
Badge access
C.
Badge access
Answers
D.
Access control vestibule
D.
Access control vestibule
Answers
E.
Sign-in sheet
E.
Sign-in sheet
Answers
F.
Sensor
F.
Sensor
Answers
Suggested answer: C, D

Explanation:

Badge access and access control vestibule are two of the best ways to ensure only authorized personnel can access a secure facility. Badge access requires the personnel to present a valid and authenticated badge to a reader or scanner that grants or denies access based on predefined rules and permissions. Access control vestibule is a physical security measure that consists of a small room or chamber with two doors, one leading to the outside and one leading to the secure area. The personnel must enter the vestibule and wait for the first door to close and lock before the second door can be opened.This prevents tailgating or piggybacking by unauthorized individuals.Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 4, pages 197-1981

A company's marketing department collects, modifies, and stores sensitive customer data. The infrastructure team is responsible for securing the data while in transit and at rest. Which of the following data roles describes the customer?

A.
Processor
A.
Processor
Answers
B.
Custodian
B.
Custodian
Answers
C.
Subject
C.
Subject
Answers
D.
Owner
D.
Owner
Answers
Suggested answer: C

Explanation:

According to the CompTIA Security+ SY0-701 Certification Study Guide, data subjects are the individuals whose personal data is collected, processed, or stored by an organization. Data subjects have certain rights and expectations regarding how their data is handled, such as the right to access, correct, delete, or restrict their data. Data subjects are different from data owners, who are the individuals or entities that have the authority and responsibility to determine how data is classified, protected, and used. Data subjects are also different from data processors, who are the individuals or entities that perform operations on data on behalf of the data owner, such as collecting, modifying, storing, or transmitting data. Data subjects are also different from data custodians, who are the individuals or entities that implement the security controls and procedures specified by the data owner to protect data while in transit and at rest.

Reference CompTIA Security+ SY0-701 Certification Study Guide, Chapter 2: Data Security, page 511

Malware spread across a company's network after an employee visited a compromised industry blog. Which of the following best describes this type of attack?

A.
Impersonation
A.
Impersonation
Answers
B.
Disinformation
B.
Disinformation
Answers
C.
Watering-hole
C.
Watering-hole
Answers
D.
Smishing
D.
Smishing
Answers
Suggested answer: C

Explanation:

A watering-hole attack is a type of cyberattack that targets groups of users by infecting websites that they commonly visit. The attackers exploit vulnerabilities to deliver a malicious payload to the organization's network. The attack aims to infect users' computers and gain access to a connected corporate network. The attackers target websites known to be popular among members of a particular organization or demographic.The attack differs from phishing and spear-phishing attacks, which typically attempt to steal data or install malware onto users' devices1

In this scenario, the compromised industry blog is the watering hole that the attackers used to spread malware across the company's network. The attackers likely chose this blog because they knew that the employees of the company were interested in its content and visited it frequently. The attackers may have injected malicious code into the blog or redirected the visitors to a spoofed website that hosted the malware. The malware then infected the employees' computers and propagated to the network.

Reference 1:Watering Hole Attacks: Stages, Examples, Risk Factors & Defense ...

A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?

A.
Insurance
A.
Insurance
Answers
B.
Patching
B.
Patching
Most voted
Answers (2)
Most voted
C.
Segmentation
C.
Segmentation
Answers
D.
Replacement
D.
Replacement
Answers
Suggested answer: C

Explanation:

Segmentation is a technique that divides a network into smaller subnetworks or segments, each with its own security policies and controls. Segmentation can help mitigate network access vulnerabilities in legacy loT devices by isolating them from other devices and systems, reducing their attack surface and limiting the potential impact of a breach. Segmentation can also improve network performance and efficiency by reducing congestion and traffic. Patching, insurance, and replacement are other possible strategies to deal with network access vulnerabilities, but they may not be feasible or effective in the short term. Patching may not be available or compatible for legacy loT devices, insurance may not cover the costs or damages of a cyberattack, and replacement may be expensive and time-consuming.

Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 142-143

A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?

A.
Encryption at rest
A.
Encryption at rest
Answers
B.
Masking
B.
Masking
Answers
C.
Data classification
C.
Data classification
Answers
D.
Permission restrictions
D.
Permission restrictions
Answers
Suggested answer: A

Explanation:

Encryption at rest is a strategy that protects data stored on a device, such as a laptop, by converting it into an unreadable format that can only be accessed with a decryption key or password. Encryption at rest can prevent data loss on stolen laptops by preventing unauthorized access to the data, even if the device is physically compromised. Encryption at rest can also help comply with data privacy regulations and standards that require data protection. Masking, data classification, and permission restrictions are other strategies that can help protect data, but they may not be sufficient or applicable for data stored on laptops. Masking is a technique that obscures sensitive data elements, such as credit card numbers, with random characters or symbols, but it is usually used for data in transit or in use, not at rest. Data classification is a process that assigns labels to data based on its sensitivity and business impact, but it does not protect the data itself. Permission restrictions are rules that define who can access, modify, or delete data, but they may not prevent unauthorized access if the laptop is stolen and the security controls are bypassed.

Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 17-18, 372-373

Which of the following would be best suited for constantly changing environments?

A.
RTOS
A.
RTOS
Answers
B.
Containers
B.
Containers
Answers
C.
Embedded systems
C.
Embedded systems
Answers
D.
SCADA
D.
SCADA
Answers
Suggested answer: B

Explanation:

Containers are a method of virtualization that allows applications to run in isolated environments with their own dependencies, libraries, and configurations. Containers are best suited for constantly changing environments because they are lightweight, portable, scalable, and easy to deploy and update.Containers can also support microservices architectures, which enable faster and more frequent delivery of software features.Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 10: Mobile Device Security, page 5121

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

A.
Changing the remote desktop port to a non-standard number
A.
Changing the remote desktop port to a non-standard number
Answers
B.
Setting up a VPN and placing the jump server inside the firewall
B.
Setting up a VPN and placing the jump server inside the firewall
Answers
C.
Using a proxy for web connections from the remote desktop server
C.
Using a proxy for web connections from the remote desktop server
Answers
D.
Connecting the remote server to the domain and increasing the password length
D.
Connecting the remote server to the domain and increasing the password length
Answers
Suggested answer: B

Explanation:

A VPN is a virtual private network that creates a secure tunnel between two or more devices over a public network. A VPN can encrypt and authenticate the data, as well as hide the IP addresses and locations of the devices. A jump server is a server that acts as an intermediary between a user and a target server, such as a production server. A jump server can provide an additional layer of security and access control, as well as logging and auditing capabilities. A firewall is a device or software that filters and blocks unwanted network traffic based on predefined rules. A firewall can protect the internal network from external threats and limit the exposure of sensitive services and ports. A security analyst should recommend setting up a VPN and placing the jump server inside the firewall to improve the security of the remote desktop access to the production network.This way, the remote desktop service will not be exposed to the public network, and only authorized users with VPN credentials can access the jump server and then the production server.Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 8: Secure Protocols and Services, page 382-3831; Chapter 9: Network Security, page 441-4421

Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

A.
Remote access points should fail closed.
A.
Remote access points should fail closed.
Answers
B.
Logging controls should fail open.
B.
Logging controls should fail open.
Answers
C.
Safety controls should fail open.
C.
Safety controls should fail open.
Answers
D.
Logical security controls should fail closed.
D.
Logical security controls should fail closed.
Answers
Suggested answer: C

Explanation:

Safety controls are security controls that are designed to protect human life and physical assets from harm or damage. Examples of safety controls include fire alarms, sprinklers, emergency exits, backup generators, and surge protectors. Safety controls should fail open, which means that they should remain operational or allow access when a failure or error occurs. Failing open can prevent or minimize the impact of a disaster, such as a fire, flood, earthquake, or power outage, on human life and physical assets. For example, if a fire alarm fails, it should still trigger the sprinklers and unlock the emergency exits, rather than remain silent and locked. Failing open can also ensure that essential services, such as healthcare, transportation, or communication, are available during a crisis. Remote access points, logging controls, and logical security controls are other types of security controls, but they should not fail open in a data center. Remote access points are security controls that allow users or systems to access a network or a system from a remote location, such as a VPN, a web portal, or a wireless access point. Remote access points should fail closed, which means that they should deny access when a failure or error occurs. Failing closed can prevent unauthorized or malicious access to the data center's network or systems, such as by hackers, malware, or rogue devices. Logging controls are security controls that record and monitor the activities and events that occur on a network or a system, such as user actions, system errors, security incidents, or performance metrics. Logging controls should also fail closed, which means that they should stop or suspend the activities or events when a failure or error occurs. Failing closed can prevent data loss, corruption, or tampering, as well as ensure compliance with regulations and standards. Logical security controls are security controls that use software or code to protect data and systems from unauthorized or malicious access, modification, or destruction, such as encryption, authentication, authorization, or firewall. Logical security controls should also fail closed, which means that they should block or restrict access when a failure or error occurs. Failing closed can prevent data breaches, cyberattacks, or logical flaws, as well as ensure confidentiality, integrity, and availability of data and systems.

Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 142-143, 372-373, 376-377

Which of the following is the most common data loss path for an air-gapped network?

A.
Bastion host
A.
Bastion host
Answers
B.
Unsecured Bluetooth
B.
Unsecured Bluetooth
Answers
C.
Unpatched OS
C.
Unpatched OS
Answers
D.
Removable devices
D.
Removable devices
Answers
Suggested answer: D

Explanation:

An air-gapped network is a network that is physically isolated from other networks, such as the internet, to prevent unauthorized access and data leakage. However, an air-gapped network can still be compromised by removable devices, such as USB drives, CDs, DVDs, or external hard drives, that are used to transfer data between the air-gapped network and other networks. Removable devices can carry malware, spyware, or other malicious code that can infect the air-gapped network or exfiltrate data from it.Therefore, removable devices are the most common data loss path for an air-gapped network.Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 9: Network Security, page 4491

Which of the following can best protect against an employee inadvertently installing malware on a company system?

A.
Host-based firewall
A.
Host-based firewall
Answers
B.
System isolation
B.
System isolation
Answers
C.
Least privilege
C.
Least privilege
Answers
D.
Application allow list
D.
Application allow list
Answers
Suggested answer: D

Explanation:

An application allow list is a security technique that specifies which applications are authorized to run on a system and blocks all other applications. An application allow list can best protect against an employee inadvertently installing malware on a company system because it prevents the execution of any unauthorized or malicious software, such as viruses, worms, trojans, ransomware, or spyware.An application allow list can also reduce the attack surface and improve the performance of the system.Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 11: Secure Application Development, page 5511

Total 350 questions
Go to page: of 35