ExamGecko
Home Home / CompTIA / SY0-701

CompTIA SY0-701 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











An IT manager is increasing the security capabilities of an organization after a data classification initiative determined that sensitive data could be exfiltrated from the environment. Which of the following solutions would mitigate the risk?

A.
XDR
A.
XDR
Answers
B.
SPF
B.
SPF
Answers
C.
DLP
C.
DLP
Answers
D.
DMARC
D.
DMARC
Answers
Suggested answer: C

Explanation:

To mitigate the risk of sensitive data being exfiltrated from the environment, the IT manager should implement a Data Loss Prevention (DLP) solution. DLP monitors and controls the movement of sensitive data, ensuring that unauthorized transfers are blocked and potential data breaches are prevented.

XDR (Extended Detection and Response) is useful for threat detection across multiple environments but doesn't specifically address data exfiltration.

SPF (Sender Policy Framework) helps prevent email spoofing, not data exfiltration.

DMARC (Domain-based Message Authentication, Reporting & Conformance) also addresses email security and spoofing, not data exfiltration.

An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?

A.
Asset inventory
A.
Asset inventory
Answers
B.
Network enumeration
B.
Network enumeration
Answers
C.
Data certification
C.
Data certification
Answers
D.
Procurement process
D.
Procurement process
Answers
Suggested answer: A

Explanation:

To ensure that all systems requiring the patch are updated, the systems administrator must maintain an accurate asset inventory. This inventory lists all hardware and software assets within the organization, allowing the administrator to identify which systems are affected by the patch and ensuring that none are missed during the update process.

Network enumeration is used to discover devices on a network but doesn't track software that requires patching.

Data certification and procurement process are unrelated to tracking systems for patching purposes.


Which of the following examples would be best mitigated by input sanitization?

A.
<script>alert ('Warning!') ,-</script>
A.
<script>alert ('Warning!') ,-</script>
Answers
B.
nmap - 10.11.1.130
B.
nmap - 10.11.1.130
Answers
C.
Email message: 'Click this link to get your free gift card.'
C.
Email message: 'Click this link to get your free gift card.'
Answers
D.
Browser message: 'Your connection is not private.'
D.
Browser message: 'Your connection is not private.'
Answers
Suggested answer: A

Explanation:

This example of a script injection attack would be best mitigated by input sanitization. Input sanitization involves cleaning or filtering user inputs to ensure that they do not contain harmful data, such as malicious scripts. This prevents attackers from executing script-based attacks (e.g., Cross-Site Scripting or XSS).

Nmap command is unrelated to input sanitization, as it is a network scanning tool.

Email phishing attempts require different mitigations, such as user training.

Browser warnings about insecure connections involve encryption protocols, not input validation

A security engineer is installing an IPS to block signature-based attacks in the environment. Which of the following modes will best accomplish this task?

A.
Monitor
A.
Monitor
Answers
B.
Sensor
B.
Sensor
Answers
C.
Audit
C.
Audit
Answers
D.
Active
D.
Active
Answers
Suggested answer: D

Explanation:

To block signature-based attacks, the Intrusion Prevention System (IPS) must be in active mode. In this mode, the IPS can actively monitor and block malicious traffic in real time based on predefined signatures. This is the best mode to prevent known attack types from reaching the internal network.

Monitor mode and sensor mode are typically passive, meaning they only observe and log traffic without actively blocking it.

Audit mode is used for review purposes and does not actively block traffic.

An organization wants to limit potential impact to its log-in database in the event of a breach. Which of the following options is the security team most likely to recommend?

A.
Tokenization
A.
Tokenization
Answers
B.
Hashing
B.
Hashing
Answers
C.
Obfuscation
C.
Obfuscation
Answers
D.
Segmentation
D.
Segmentation
Answers
Suggested answer: B

Explanation:

To limit the potential impact on the log-in database in case of a breach, the security team would most likely recommend hashing. Hashing converts passwords into fixed-length strings of characters, which cannot be easily reversed to reveal the original passwords. Even if the database is breached, attackers cannot easily retrieve the actual passwords if they are properly hashed (especially with techniques like salting).

Tokenization is used to replace sensitive data with a token, but it is more common for protecting credit card data than passwords.

Obfuscation is the process of making data harder to interpret but is weaker than hashing for password protection.

Segmentation helps isolate data but doesn't directly protect the contents of the login database.

A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the following should be configured on the existing network infrastructure to best prevent this activity?

A.
Port security
A.
Port security
Answers
B.
Web application firewall
B.
Web application firewall
Answers
C.
Transport layer security
C.
Transport layer security
Answers
D.
Virtual private network
D.
Virtual private network
Answers
Suggested answer: A

Explanation:

Port security is the best solution to prevent unauthorized devices, like a visitor's laptop, from connecting to the company's network. Port security can limit the number of devices that can connect to a network switch port and block unauthorized MAC addresses, effectively stopping unauthorized access attempts.

Web application firewall (WAF) protects against web-based attacks, not unauthorized network access.

Transport Layer Security (TLS) ensures encrypted communication but does not manage physical network access.

Virtual Private Network (VPN) secures remote connections but does not control access through physical network ports.

During a penetration test, a vendor attempts to enter an unauthorized area using an access badge Which of the following types of tests does this represent?

A.
Defensive
A.
Defensive
Answers
B.
Passive
B.
Passive
Answers
C.
Offensive
C.
Offensive
Answers
D.
Physical
D.
Physical
Answers
Suggested answer: D

Explanation:

Attempting to enter an unauthorized area using an access badge during a penetration test is an example of a physical test. This type of test evaluates the effectiveness of physical security controls, such as access badges, security guards, and locks, in preventing unauthorized access to restricted areas.

Defensive and offensive testing typically refer to digital or network-based penetration testing strategies.

Passive testing involves observing or monitoring but not interacting with the environment.

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

A.
Application
A.
Application
Answers
B.
Authentication
B.
Authentication
Answers
C.
DHCP
C.
DHCP
Answers
D.
Network
D.
Network
Answers
E.
Firewall
E.
Firewall
Answers
F.
Database
F.
Database
Answers
Suggested answer: C, E

Explanation:

To identify the impacted host in a command-and-control (C2) server incident, the following logs should be analyzed:

DHCP logs: These logs record IP address assignments. By reviewing DHCP logs, an organization can determine which host was assigned a specific IP address during the time of the attack.

Firewall logs: Firewall logs will show traffic patterns, including connections to external C2 servers. Analyzing these logs helps to identify the IP address and port numbers of the communicating host.

Application, Authentication, and Database logs are less relevant in this context because they focus on internal processes and authentication events rather than network traffic involved in a C2 attack.

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?

A.
Order of volatility
A.
Order of volatility
Answers
B.
Preservation of event logs
B.
Preservation of event logs
Answers
C.
Chain of custody
C.
Chain of custody
Answers
D.
Compliance with legal hold
D.
Compliance with legal hold
Answers
Suggested answer: A

Explanation:

When conducting a forensic analysis after an incident, it's essential to prioritize the data collection process based on the 'order of volatility.' This principle dictates that more volatile data (e.g., data in memory, network connections) should be captured before less volatile data (e.g., disk drives, logs). The idea is to preserve the most transient and potentially valuable evidence first, as it is more likely to be lost or altered quickly.

Reference =

CompTIA Security+ SY0-701 Course Content: Domain 04 Security Operations.

CompTIA Security+ SY0-601 Study Guide: Chapter on Digital Forensics.

A security analyst is creating base for the server team to follow when hardening new devices for deployment. Which of the following beet describes what the analyst is creating?

A.
Change management procedure
A.
Change management procedure
Answers
B.
Information security policy
B.
Information security policy
Answers
C.
Cybersecurity framework
C.
Cybersecurity framework
Answers
D.
Secure configuration guide
D.
Secure configuration guide
Answers
Suggested answer: D

Explanation:

The security analyst is creating a 'secure configuration guide,' which is a set of instructions or guidelines used to configure devices securely before deployment. This guide ensures that the devices are set up according to best practices to minimize vulnerabilities and protect against potential security threats.

Reference =

CompTIA Security+ SY0-701 Course Content: Domain 03 Security Architecture.

CompTIA Security+ SY0-601 Study Guide: Chapter on System Hardening and Secure Configuration.

Total 350 questions
Go to page: of 35