최신 SY0-701 무료덤프 - CompTIA Security+ Certification
A small business uses kiosks on the sales floor to display product information for customers. A security team discovers the kiosks use end-of-life operating systems. Which of the following is the security team most likely to document as a security implication of the current architecture?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A network administrator wants to ensure that network traffic is highly secure while in transit. Which of the following actions best describes the actions the network administrator should take?
정답: B
Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following can best protect against an employee inadvertently installing malware on a company system?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst learns that an attack vector, used as part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas.
The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?
The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following techniques can be used to sanitize the data contained on a hard drive while allowing for the hard drive to be repurposed?
정답: B
An organization is developing a security program that conveys the responsibilities associated with the general operation of systems and software within the organization. Which of the following documents would most likely communicate these expectations?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is the most likely to be included as an element of communication in a security awareness program?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
During a SQL update of a database, a temporary field used as part of the update sequence was modified by an attacker before the update completed in order to allow access to the system. Which of the following best describes this type of vulnerability?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following actions must an organization take to comply with a person's request for the right to be forgotten?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A security manager created new documentation to use in response to various types of security incidents.
Which of the following is the next step the manager should take?
Which of the following is the next step the manager should take?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee's corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)