ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

A company is working with a vendor to perform a penetration test Which of the following includes an estimate about the number of hours required to complete the engagement?

SOW
SOW
BPA
BPA
SLA
SLA
NDA
NDA
Suggested answer: A
Explanation:

A statement of work (SOW) is a document that defines the scope, objectives, deliverables, timeline, and costs of a project or service. It typically includes an estimate of the number of hours required to complete the engagement, as well as the roles and responsibilities of the parties involved. A SOW is often used for penetration testing projects to ensure that both the client and the vendor have a clear and mutual understanding of what is expected and how the work will be performed. A business partnership agreement (BPA), a service level agreement (SLA), and a non-disclosure agreement (NDA) are different types of contracts that may be related to a penetration testing project, but they do not include an estimate of the number of hours required to complete the engagement.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 492;What to Look For in a Penetration Testing Statement of Work?

asked 02/10/2024
Giulia Alberghi
45 questions

Question 152

Report Export Collapse

The local administrator account for a company's VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have most likely prevented this from happening'?

Using least privilege
Using least privilege
Changing the default password
Changing the default password
Assigning individual user IDs
Assigning individual user IDs
Reviewing logs more frequently
Reviewing logs more frequently
Suggested answer: B
Explanation:

Changing the default password for the local administrator account on a VPN appliance is a basic security measure that would have most likely prevented the unexpected login to the remote management interface. Default passwords are often easy to guess or publicly available, and attackers can use them to gain unauthorized access to devices and systems. Changing the default password to a strong and unique one reduces the risk of brute-force attacks and credential theft. Using least privilege, assigning individual user IDs, and reviewing logs more frequently are also good security practices, but they are not as effective as changing the default password in preventing the unexpected login.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 116;Local Admin Accounts - Security Risks and Best Practices (Part 1)


asked 02/10/2024
Anand Prakash
40 questions

Question 153

Report Export Collapse

Which of the following should a systems administrator use to ensure an easy deployment of resources within the cloud provider?

Software as a service
Software as a service
Infrastructure as code
Infrastructure as code
Internet of Things
Internet of Things
Software-defined networking
Software-defined networking
Suggested answer: B
Explanation:

Infrastructure as code (IaC) is a method of using code and automation to manage and provision cloud resources, such as servers, networks, storage, and applications. IaC allows for easy deployment, scalability, consistency, and repeatability of cloud environments. IaC is also a key component of DevSecOps, which integrates security into the development and operations processes.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 6: Cloud and Virtualization Concepts, page 294.

asked 02/10/2024
Scott Albee
36 questions

Question 154

Report Export Collapse

An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?

ACL
ACL
DLP
DLP
IDS
IDS
IPS
IPS
Suggested answer: D
Explanation:

An intrusion prevention system (IPS) is a security device that monitors network traffic and blocks or modifies malicious packets based on predefined rules or signatures. An IPS can prevent attacks that exploit known vulnerabilities in older browser versions by detecting and dropping the malicious packets before they reach the target system. An IPS can also perform other functions, such as rate limiting, encryption, or redirection.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 3: Securing Networks, page 132.

asked 02/10/2024
Azwihangwisi Ntikane
42 questions

Question 155

Report Export Collapse

During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).

Federation
Federation
Identity proofing
Identity proofing
Password complexity
Password complexity
Default password changes
Default password changes
Password manager
Password manager
Open authentication
Open authentication
Suggested answer: A, C
Explanation:

Federation is an access management concept that allows users to authenticate once and access multiple resources or services across different domains or organizations. Federation relies on a trusted third party that stores the user's credentials and provides them to the requested resources or services without exposing them. Password complexity is a security measure that requires users to create passwords that meet certain criteria, such as length, character types, and uniqueness.Password complexity can help prevent brute-force attacks, password guessing, and credential stuffing by making passwords harder to crack or guess.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 308-309 and 312-3131

asked 02/10/2024
Gopakumar Nair
47 questions

Question 156

Report Export Collapse

A company currently uses passwords for logging in to company-owned devices and wants to add a second authentication factor Per corporate policy, users are not allowed to have smartphones at their desks Which of the following would meet these requirements?

Smart card
Smart card
PIN code
PIN code
Knowledge-based question
Knowledge-based question
Secret key
Secret key
Suggested answer: A
Explanation:

A smart card is a physical device that contains an embedded integrated circuit chip that can store and process data. A smart card can be used as a second authentication factor, in addition to a password, to verify the identity of a user who wants to log in to company-owned devices. A smart card requires a smart card reader to access the data on the chip, which adds an extra layer of security. A smart card meets the requirements of the company because it does not involve a smartphone or any other device that is not allowed at the desks

asked 02/10/2024
Michael Grisonichi
44 questions

Question 157

Report Export Collapse

A security analyst receives a SIEM alert that someone logged in to the app admin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log:

CompTIA SY0-701 image Question 157 98850 10022024175414000000

Which of the following can the security analyst conclude?

A replay attack is being conducted against the application.
A replay attack is being conducted against the application.
An injection attack is being conducted against a user authentication system.
An injection attack is being conducted against a user authentication system.
Most voted
(2)
Most voted
A service account password may have been changed, resulting in continuous failed logins within the application.
A service account password may have been changed, resulting in continuous failed logins within the application.
A credentialed vulnerability scanner attack is testing several CVEs against the application.
A credentialed vulnerability scanner attack is testing several CVEs against the application.
Suggested answer: A
Explanation:

A replay attack is a type of network attack where an attacker captures and retransmits a valid data transmission, such as a login request, to gain unauthorized access or impersonate a legitimate user.

In this case, the attacker may have captured the credentials of the app admin test account and used them to log in to the application. The application log shows multiple failed login attempts from different IP addresses, which indicates a replay attack.

asked 02/10/2024
Daniel Ramirez
52 questions

Question 158

Report Export Collapse

An organization is having difficulty correlating events from its individual AV. EDR. DLP. SWG. WAF, MDM. HIPS, and CASB systems. Which of the following is the best way to improve the situation?

Remove expensive systems that generate few alerts.
Remove expensive systems that generate few alerts.
Modify the systems to alert only on critical issues.
Modify the systems to alert only on critical issues.
Utilize a SIEM to centralize logs and dashboards.
Utilize a SIEM to centralize logs and dashboards.
Implement a new syslog/NetFlow appliance.
Implement a new syslog/NetFlow appliance.
Suggested answer: C
Explanation:

A SIEM (Security Information and Event Management) is a system that collects, analyzes, and correlates data from multiple sources, such as AV (antivirus), EDR (endpoint detection and response), DLP (data loss prevention), SWG (secure web gateway), WAF (web application firewall), MDM (mobile device management), HIPS (host intrusion prevention system), and CASB (cloud access security broker). A SIEM can help improve the situation by providing a centralized view of the security posture, alerts, and incidents across the organization.

asked 02/10/2024
Jordan Reid
41 questions

Question 159

Report Export Collapse

An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?

Smishing
Smishing
Disinformation
Disinformation
Impersonating
Impersonating
Most voted
(3)
Most voted
Whaling
Whaling
Suggested answer: D
Explanation:

Whaling is a type of phishing attack that targets high-profile individuals, such as executives, celebrities, or politicians. The attacker impersonates someone with authority or influence and tries to trick the victim into performing an action, such as transferring money, revealing sensitive information, or clicking on a malicious link.Whaling is also called CEO fraud or business email compromise2.

asked 02/10/2024
Manish Chaudhary
40 questions

Question 160

Report Export Collapse

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Secured zones
Secured zones
Subject role
Subject role
Adaptive identity
Adaptive identity
Threat scope reduction
Threat scope reduction
Suggested answer: A
Explanation:

Secured zones are a key component of the Zero Trust data plane, which is the layer where data is stored, processed, and transmitted. Secured zones are logical or physical segments of the network that isolate data and resources based on their sensitivity and risk.Secured zones enforce granular policies and controls to prevent unauthorized access and lateral movement within the network1.

asked 02/10/2024
Jozsef Stelly
54 questions
Total 517 questions
Go to page: of 52
Search

Related questions