CompTIA Security+Exam (SY0-701) Free Questions - Part 19
Question No : 271) An organization has implemented a two-step verification process to protect user access to data that 6 stored in the could Each employee now uses an email address of mobile number a code to access the data. Which of the following authentication methods did the organization implement?
A. Token key
B. Static code
C. Push notification
D. HOTP
Question No : 272) Which of the following would detect intrusions at the perimeter of an airport?
A. Signage
B. Fencing
C. Motion sensors
D. Lighting
E. Bollards
Question No : 273) Which of the following in a forensic investigation should be priorities based on the order of volatility? (Select TWO).
A. Page files
B. Event logs
C. RAM
D. Cache
E. Stored files
F. HDD
Question No : 274) A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security. Which of the following configuration should an analyst enable to improve security? (Select Two)
A. RADIUS
B. PEAP
C. WPS
D. WEP-TKIP
E. SSL
F. WPA2-PSK
Question No : 275) An amusement park is implementing a biometric system that validates customers' fingerprints to ensure they are not sharing tickets The park's owner values customers above all and would prefer customers' convenience over security. For this reason, which of the following features should the security team prioritize FIRST?
A. LOW FAR
B. Low efficacy
C. Low FRR
D. Low CER
Question No : 276) Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following:
Multiple reports of breached credentials within that time period
Traffic being redirected in certain parts of the network
Fraudulent emails being sent by various internal users without their consent
Which of the following types of attacks was MOST likely used?
A. Replay attack
B. Race condition
C. Cross site scripting
D. Request forgeries
Question No : 277) A company wants to deploy systems alongside production systems in order to entice threat actors and to learn more about attackers. Which of the following BEST describe these systems?
A. DNS sinkholes
B. Honepots
C. Virtual machines
D. Neural network
Question No : 278) A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager claimed the reports were previously sent via email, but then quickly generated and backdated the reports before submitting them as plain text within the body of a new email message thread. Which of the following actions MOST likely supports an investigation for fraudulent submission?
A. Establish chain of custody.
B. Inspect the file metadata.
C. Reference the data retention policy.
D. Review the email event logs
Question No : 279) A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server:
Which of the following BEST describes this kind of attack?
A. Directory traversal
B. SQL injection
C. API
D. Request forgery
Question No : 280) Which of the following BEST helps to demonstrate integrity during a forensic investigation?
A. Event logs
B. Encryption
C. Hashing
D. Snapshots
Question No : 281) A security an analyst needs to implement security features across smartphones. laptops, and tablets Which of the following would be the MOST effective across heterogeneous platforms?
A. Enforcing encryption
B. Deploying GPOs
C. Removing administrative permissions
D. Applying MDM software
Question No : 282) Several employees have noticed other bystanders can clearly observe a terminal where passcodes are being entered. Which of the following can be eliminated with the use of a privacy screen?
A. Shoulder surfing
B. Spear phishing
C. Impersonation attack
D. Card cloning
Question No : 283) An organization regularly scans its infrastructure for missing security patches but is concerned about hackers gaining access to the scanner's account. Which of the following would be BEST to minimize this risk?
A. Require a complex, eight-character password that is updated every 90 days.
B. Perform only non-intrusive scans of workstations.
C. Use non-credentialed scans against high-risk servers.
D. Log and alert on unusual scanner account logon times.
Question No : 284) A recent security audit revealed that a popular website with IP address 172.16.1.5 also has an FTP service that employees were using to store sensitive corporate data. The organization's outbound firewall processes rules top-down. Which of the following would permit HTTP and HTTPS, while denying all other services for this host?
A. access-rule permit tcp destination 172.16.1.5 port 80
access-rule permit tcp destination 172.16-1-5 port 443
access-rule deny ip destination 172.16.1.5
B. access-rule permit tcp destination 172.16.1.5 port 22
access-rule permit tcp destination 172.16.1.5 port 443
access-rule deny tcp destination 172.16.1.5 port 80
C. access-rule permit tcp destination 172.16.1.5 port 21
access-rule permit tcp destination 172.16.1.5 port 80
access-rule deny ip destination 172.16.1.5
D. access-rule permit tcp destination 172.16.1.5 port 80
access-rule permit tcp destination 172.16.1.5 port 443
access-rule deny tcp destination 172.16.1.5 port 21
Question No : 285) Which of the following is a difference between a DRP and a BCP?
A. A BCP keeps operations running during a disaster while a DRP does not.
B. A BCP prepares for any operational interruption while a DRP prepares for natural disasters
C. A BCP is a technical response to disasters while a DRP is operational.
D. A BCP Is formally written and approved while a DRP is not.
SY0-701 Answers