ExamGecko
Home Home / CompTIA / SY0-701

CompTIA SY0-701 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











In which of the following scenarios is tokenization the best privacy technique 10 use?

A.
Providing pseudo-anonymization tor social media user accounts
A.
Providing pseudo-anonymization tor social media user accounts
Answers
B.
Serving as a second factor for authentication requests
B.
Serving as a second factor for authentication requests
Answers
C.
Enabling established customers to safely store credit card Information
C.
Enabling established customers to safely store credit card Information
Answers
D.
Masking personal information inside databases by segmenting data
D.
Masking personal information inside databases by segmenting data
Answers
Suggested answer: C

Explanation:

Tokenization is a process that replaces sensitive data, such as credit card information, with a non-sensitive equivalent (token) that can be used in place of the actual data. This technique is particularly useful in securely storing payment information because the token can be safely stored and transmitted without exposing the original credit card number.

Reference =

CompTIA Security+ SY0-701 Course Content: Domain 03 Security Architecture.

CompTIA Security+ SY0-601 Study Guide: Chapter on Cryptography and Data Protection.

A security administrator recently reset local passwords and the following values were recorded in the system:

Which of the following in the security administrator most likely protecting against?

A.
Account sharing
A.
Account sharing
Answers
B.
Weak password complexity
B.
Weak password complexity
Answers
C.
Pass-the-hash attacks
C.
Pass-the-hash attacks
Answers
D.
Password compromise
D.
Password compromise
Answers
Suggested answer: C

Explanation:

The scenario shows MD5 hashed password values. The most likely reason the security administrator is focusing on these values is to protect against pass-the-hash attacks. In this type of attack, an attacker can use a captured hash to authenticate without needing to know the actual plaintext password. By managing and monitoring these hashes, the administrator can implement strategies to mitigate this type of threat.

Reference =

CompTIA Security+ SY0-701 Course Content: Domain 04 Security Operations.

CompTIA Security+ SY0-601 Study Guide: Chapter on Identity and Access Management.

A vendor needs to remotely and securely transfer files from one server to another using the command line. Which of the following protocols should be Implemented to allow for this type of access? (Select two).

A.
SSH
A.
SSH
Answers
B.
SNMP
B.
SNMP
Answers
C.
RDP
C.
RDP
Answers
D.
S/MIME
D.
S/MIME
Answers
E.
SMTP
E.
SMTP
Answers
F.
SFTP
F.
SFTP
Answers
Suggested answer: A, F

Explanation:

Secure Shell (SSH) is a protocol used for secure command-line access to remote systems, while Secure File Transfer Protocol (SFTP) is an extension of SSH used specifically for securely transferring files. Both SSH and SFTP ensure that data is encrypted during transmission, protecting it from interception or tampering.

Reference =

CompTIA Security+ SY0-701 Course Content: Domain 03 Security Architecture.

CompTIA Security+ SY0-601 Study Guide: Chapter on Secure Protocols and Encryption.

Which of the following data roles is responsible for identifying risks and appropriate access to data?

A.
Owner
A.
Owner
Answers
B.
Custodian
B.
Custodian
Answers
C.
Steward
C.
Steward
Answers
D.
Controller
D.
Controller
Answers
Suggested answer: A

Explanation:

The data owner is the role responsible for identifying risks to data and determining who should have access to that data. The owner has the authority to make decisions about the protection and usage of the data, including setting access controls and ensuring that appropriate security measures are in place.

Reference = CompTIA Security+ SY0-701 study materials, particularly in the domain of data governance and the roles and responsibilities associated with data management.

Which of the following should a security operations center use to improve its incident response procedure?

A.
Playbooks
A.
Playbooks
Answers
B.
Frameworks
B.
Frameworks
Answers
C.
Baselines
C.
Baselines
Answers
D.
Benchmarks
D.
Benchmarks
Answers
Suggested answer: A

Explanation:

A playbook is a documented set of procedures that outlines the step-by-step response to specific types of cybersecurity incidents. Security Operations Centers (SOCs) use playbooks to improve consistency, efficiency, and accuracy during incident response. Playbooks help ensure that the correct procedures are followed based on the type of incident, ensuring swift and effective remediation.

Frameworks provide general guidelines for implementing security but are not specific enough for incident response procedures.

Baselines represent normal system behavior and are used for anomaly detection, not incident response guidance.

Benchmarks are performance standards and are not directly related to incident response.

A company is concerned about the theft of client data from decommissioned laptops. Which of the following is the most cost-effective method to decrease this risk?

A.

Wiping

A.

Wiping

Answers
B.

Recycling

B.

Recycling

Answers
C.

Shredding

C.

Shredding

Answers
D.

Deletion

D.

Deletion

Answers
Suggested answer: A

Explanation:

Wiping involves securely erasing data by overwriting the hard drive, ensuring the information is unrecoverable. It is cost-effective compared to physical destruction methods like shredding.

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company's reliance on open-source libraries?

A.

Buffer overflow

A.

Buffer overflow

Answers
B.

SQL injection

B.

SQL injection

Answers
C.

Cross-site scripting

C.

Cross-site scripting

Answers
D.

Zero day

D.

Zero day

Answers
Suggested answer: D

Explanation:

Zero-day vulnerabilities are unknown flaws in software, making them harder to patch, especially when using open-source libraries without dedicated support teams.

While investigating a possible incident, a security analyst discovers the following log entries:

67.118.34.157 ----- [28/Jul/2022:10:26:59 -0300] 'GET /query.php?q-wireless%20headphones / HTTP/1.0' 200 12737

132.18.222.103 ----[28/Jul/2022:10:27:10 -0300] 'GET /query.php?q=123 INSERT INTO users VALUES('temp', 'pass123')# / HTTP/1.0' 200 935

12.45.101.121 ----- [28/Jul/2022:10:27:22 -0300] 'GET /query.php?q=mp3%20players I HTTP/1.0' 200 14650

Which of the following should the analyst do first?

A.

Implement a WAF

A.

Implement a WAF

Answers
B.

Disable the query .php script

B.

Disable the query .php script

Answers
C.

Block brute-force attempts on temporary users

C.

Block brute-force attempts on temporary users

Answers
D.

Check the users table for new accounts

D.

Check the users table for new accounts

Answers
Suggested answer: D

Explanation:

The logs show an SQL injection attack. The first step is to verify if new accounts have been created, indicating a successful injection.

Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?

A.

TPM

A.

TPM

Answers
B.

ECC

B.

ECC

Answers
C.

FDE

C.

FDE

Answers
D.

HSM

D.

HSM

Answers
Suggested answer: C

Explanation:

Full Disk Encryption (FDE) ensures that all data on the drive is encrypted, preventing unauthorized access even if the device is lost.

An organization plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible. Which of the following models offers the highest level of security?

A.

Cloud-based

A.

Cloud-based

Answers
B.

Peer-to-peer

B.

Peer-to-peer

Answers
C.

On-premises

C.

On-premises

Answers
D.

Hybrid

D.

Hybrid

Answers
Suggested answer: A

Explanation:

Cloud-based models provide strong security with features like encryption, redundancy, and disaster recovery, making it a secure choice for international operations.

Total 350 questions
Go to page: of 35