최신 SY0-701 무료덤프 - CompTIA Security+ Certification
Which of the following best describes why me SMS DIP authentication method is more risky to implement than the TOTP method?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following roles, according to the shared responsibility model, is responsible for securing the company's database in an IaaS model for a cloud environment?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
The private key for a website was stolen, and a new certificate has been issued. Which of the following needs to be updated next?
정답: C
After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following risk management strategies should an enterprise adopt first if a legacy application is critical to business operations and there are preventative controls that are not yet implemented?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following best practices gives administrators a set period to perform changes to an operational system to ensure availability and minimize business impacts?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A security team installs an IPS on an organization's network and needs to configure the system to detect and prevent specific network attacks. Which of the following settings should the team configure first within the IPS?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following architecture models ensures that critical systems are physically isolated from the network to prevent access from users with remote access privileges?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned. one of the batch jobs talked and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst needs to improve the company's authentication policy following a password audit. Which of the following should be included in the policy? (Select two).
정답: A,B
설명: (DumpTOP 회원만 볼 수 있음)
A company installed cameras and added signs to alert visitors that they are being recorded. Which of the following controls did the company implement? (Select two).
정답: C,F
An organization is evaluating new regulatory requirements associated with the implementation of corrective controls on a group of interconnected financial systems. Which of the following is the most likely reason for the new requirement?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee's corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following would be the best way to test resiliency in the event of a primary power failure?
정답: B
A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?
정답: B
A new employee accessed an unauthorized website. An investigation found that the employee violated the company's rules. Which of the following did the employee violate?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)