ExamGecko
Home Home / CompTIA / SY0-701

CompTIA SY0-701 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO's report?

A.
Insider threat
A.
Insider threat
Answers
B.
Hacktivist
B.
Hacktivist
Answers
C.
Nation-state
C.
Nation-state
Answers
D.
Organized crime
D.
Organized crime
Answers
Suggested answer: D

Explanation:

Ransomware-as-a-service is a type of cybercrime where hackers sell or rent ransomware tools or services to other criminals who use them to launch attacks and extort money from victims. This is a typical example of organized crime, which is a group of criminals who work together to conduct illegal activities for profit.Organized crime is different from other types of threat actors, such as insider threats, hacktivists, or nation-states, who may have different motives, methods, or targets.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 171

A small business uses kiosks on the sales floor to display product information for customers. A security team discovers the kiosks use end-of-life operating systems. Which of the following is the security team most likely to document as a security implication of the current architecture?

A.
Patch availability
A.
Patch availability
Answers
B.
Product software compatibility
B.
Product software compatibility
Answers
C.
Ease of recovery
C.
Ease of recovery
Answers
D.
Cost of replacement
D.
Cost of replacement
Answers
Suggested answer: A

Explanation:

End-of-life operating systems are those that are no longer supported by the vendor or manufacturer, meaning they do not receive any security updates or patches. This makes them vulnerable to exploits and attacks that take advantage of known or unknown flaws in the software. Patch availability is the security implication of using end-of-life operating systems, as it affects the ability to fix or prevent security issues.Other factors, such as product software compatibility, ease of recovery, or cost of replacement, are not directly related to security, but rather to functionality, availability, or budget.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 291

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

A.
Bluetooth
A.
Bluetooth
Answers
B.
Wired
B.
Wired
Answers
C.
NFC
C.
NFC
Answers
D.
SCADA
D.
SCADA
Answers
Suggested answer: B

Explanation:

A NAC (network access control) platform is a technology that enforces security policies on devices that attempt to access a network. A NAC platform can verify the identity, role, and compliance of the devices, and grant or deny access based on predefined rules.A NAC platform can protect both wired and wireless networks, but in this scenario, the systems administrator is trying to protect the wired attack surface, which is the set of vulnerabilities that can be exploited through a physical connection to the network12.

Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).

A.
Channels by which the organization communicates with customers
A.
Channels by which the organization communicates with customers
Answers
B.
The reporting mechanisms for ethics violations
B.
The reporting mechanisms for ethics violations
Answers
C.
Threat vectors based on the industry in which the organization operates
C.
Threat vectors based on the industry in which the organization operates
Answers
D.
Secure software development training for all personnel
D.
Secure software development training for all personnel
Answers
E.
Cadence and duration of training events
E.
Cadence and duration of training events
Answers
F.
Retraining requirements for individuals who fail phishing simulations
F.
Retraining requirements for individuals who fail phishing simulations
Answers
Suggested answer: C, E

Explanation:

A training curriculum plan for a security awareness program should address the following factors:

The threat vectors based on the industry in which the organization operates. This will help the employees to understand the specific risks and challenges that their organization faces, and how to protect themselves and the organization from cyberattacks.For example, a healthcare organization may face different threat vectors than a financial organization, such as ransomware, data breaches, or medical device hacking1.

The cadence and duration of training events. This will help the employees to retain the information and skills they learn, and to keep up with the changing security landscape. The training events should be frequent enough to reinforce the key concepts and behaviors, but not too long or too short to lose the attention or interest of the employees.For example, a security awareness program may include monthly newsletters, quarterly webinars, annual workshops, or periodic quizzes2.

An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system. Which of the following best describes the actions taken by the organization?

A.
Exception
A.
Exception
Answers
B.
Segmentation
B.
Segmentation
Answers
C.
Risk transfer
C.
Risk transfer
Answers
D.
Compensating controls
D.
Compensating controls
Answers
Suggested answer: D

Explanation:

Compensating controls are alternative security measures that are implemented when the primary controls are not feasible, cost-effective, or sufficient to mitigate the risk. In this case, the organization used compensating controls to protect the legacy system from potential attacks by disabling unneeded services and placing a firewall in front of it. This reduced the attack surface and the likelihood of exploitation.

Official CompTIA Security+ Study Guide (SY0-701), page 29

Security Controls - CompTIA Security+ SY0-701 - 1.11

Which of the following is the best reason to complete an audit in a banking environment?

A.
Regulatory requirement
A.
Regulatory requirement
Answers
B.
Organizational change
B.
Organizational change
Answers
C.
Self-assessment requirement
C.
Self-assessment requirement
Answers
D.
Service-level requirement
D.
Service-level requirement
Answers
Suggested answer: A

Explanation:

A regulatory requirement is a mandate imposed by a government or an authority that must be followed by an organization or an individual. In a banking environment, audits are often required by regulators to ensure compliance with laws, standards, and policies related to security, privacy, and financial reporting. Audits help to identify and correct any gaps or weaknesses in the security posture and the internal controls of the organization.

Official CompTIA Security+ Study Guide (SY0-701), page 507

Security+ (Plus) Certification | CompTIA IT Certifications2

Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?

A.
ARO
A.
ARO
Answers
B.
RTO
B.
RTO
Answers
C.
RPO
C.
RPO
Answers
D.
ALE
D.
ALE
Answers
E.
SLE
E.
SLE
Answers
Suggested answer: D

Explanation:

The Annual Loss Expectancy (ALE) is most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk. ALE is calculated by multiplying the Single Loss Expectancy (SLE) by the Annualized Rate of Occurrence (ARO), which provides an estimate of the annual expected loss due to a specific risk, making it valuable for long-term financial planning and risk management decisions.

Reference: CompTIA Security+ SY0-701 course content and official CompTIA study resources.

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

A.
Memory injection
A.
Memory injection
Answers
B.
Race condition
B.
Race condition
Answers
C.
Side loading
C.
Side loading
Answers
D.
SQL injection
D.
SQL injection
Answers
Suggested answer: A

Explanation:

Memory injection vulnerabilities allow unauthorized code or commands to be executed within a software program, leading to abnormal behavior such as generating outbound traffic over random high ports. This issue often arises from software not properly validating or encoding input, which can be exploited by attackers to inject malicious code.

Reference: CompTIA Security+ SY0-701 course content and official CompTIA study resources.

A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?

A.
Validate the code signature.
A.
Validate the code signature.
Answers
B.
Execute the code in a sandbox.
B.
Execute the code in a sandbox.
Answers
C.
Search the executable for ASCII strings.
C.
Search the executable for ASCII strings.
Answers
D.
Generate a hash of the files.
D.
Generate a hash of the files.
Answers
Suggested answer: A

Explanation:

Validating the code signature is the best way to verify software authenticity, as it ensures that the software has not been tampered with and that it comes from a verified source. Code signatures are digital signatures applied by the software vendor, and validating them confirms the software's integrity and origin.

Reference: CompTIA Security+ SY0-701 course content and official CompTIA study resources.

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

A.
Key stretching
A.
Key stretching
Answers
B.
Tokenization
B.
Tokenization
Answers
C.
Data masking
C.
Data masking
Answers
D.
Salting
D.
Salting
Answers
Suggested answer: D

Explanation:

Adding a random string of characters, known as a 'salt,' to a password before hashing it is known as salting. This technique strengthens passwords by ensuring that even if two users have the same password, their hashes will be different due to the unique salt, making it much harder for attackers to crack passwords using precomputed tables.

Reference: CompTIA Security+ SY0-701 course content and official CompTIA study resources.


Total 350 questions
Go to page: of 35