최신 SY0-601 무료덤프 - CompTIA Security+
While researching a data exfiltration event, the security team discovers that a large amount of data was transferred to a file storage site on the internet. Which of the following controls would work best to reduce the risk of further exfiltration using this method?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
The security team installed video cameras in a prominent location in the building lobby. Which of the following best describe this type of control? (Select two).
정답: D,F
Which of the following BEST describes a social-engineering attack that relies on an executive at a small business visiting a fake banking website where credit card and account details are harvested?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following utilizes public and private keys to secure data?
정답: D
Which of the following are common VoIP-associated vulnerabilities? (Select two).
정답: B,E
설명: (DumpTOP 회원만 볼 수 있음)
An engineer recently deployed a group of 100 web servers in a cloud environment. Per the security policy, all web-server ports except 443 should be disabled. Which of the following can be used to accomplish this task?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
In order to save on expenses Company A and Company B agree to host each other's compute and storage disaster recovery sites at their primary data centers The two data centers are about a mile apart, and they each have their own power source When necessary, one company will escort the other company to its data center. Which of the following is the greatest risk with this arrangement?
정답: D
An organization wants to ensure that proprietary information is not inadvertently exposed during facility tours. Which of the following would the organization implement to mitigate this risk?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following describes the process of concealing code or text inside a graphical image?
정답: C
Which of the following would be used to find the most common web-applicalion vulnerabilities?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following alert types is the most likely to be ignored over time?
정답: D
A web server has been compromised due to a ransomware attack. Further Investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Leveraging the information supplied below, complete the CSR for the server to set up TLS (HTTPS)
* Hostname: ws01
* Domain: comptia.org
* IPv4: 10.1.9.50
* IPV4: 10.2.10.50
* Root: home.aspx
* DNS CNAME:homesite.
Instructions:
Drag the various data points to the correct locations within the CSR. Extension criteria belong in the let hand column and values belong in the corresponding row in the right hand column.
* Hostname: ws01
* Domain: comptia.org
* IPv4: 10.1.9.50
* IPV4: 10.2.10.50
* Root: home.aspx
* DNS CNAME:homesite.
Instructions:
Drag the various data points to the correct locations within the CSR. Extension criteria belong in the let hand column and values belong in the corresponding row in the right hand column.
정답:
A hosting provider needs to prove that its security controls have been in place over the last six months and have sufficiently protected customer dat a. Which of the following would provide the best proof that the hosting provider has met the requirements?
정답: A
An engineer is using scripting to deploy a network in a cloud environment. Which the following describes this scenario?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A grocery store is expressing security and reliability concerns regarding the on-site backup strategy currently being performed by locally attached disks. The main concerns are the physical security of the backup media and the durability of the data stored on these devices Which of the following is a cost-effective approach to address these concerns?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)