최신 SY0-701 무료덤프 - CompTIA Security+ Certification
Which of the following would be the best way to handle a critical business application that is running on a legacy server?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An external vendor recently visited a company's headquarters tor a presentation. Following the visit a member of the hosting team found a file that the external vendor left behind on a server. The file contained detailed architecture information and code snippets. Which of the following data types best describes this file?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following describes a security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
You are security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.
정답:
Explanation:
Based on the logs, it seems that the host that originated the infection is 192.168.10.22. This host has a suspicious process named svchost.exe running on port 443, which is unusual for aWindows service. It also has a large number of outbound connections to different IP addresses on port 443, indicating that it is part of a botnet.
The firewall log shows that this host has been communicating with 10.10.9.18, which is another infected host on the engineering network. This host also has a suspicious process named svchost.exe running on port 443, and a large number of outbound connections to different IP addresses on port 443.
The other hosts on the R&D network (192.168.10.37 and 192.168.10.41) are clean, as they do not have any suspicious processes or connections.
Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An organization recently started hosting a new service that customers access through a web portal. A security engineer needs to add to the existing security devices a new solution to protect this new service. Which of the following is the engineer most likely to deploy?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst learns that an attack vector, used as part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following threat actors would most likely deface the website of a high-profile music group?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following best describes the concept of information being stored outside of its country of origin while still being subject to the laws and requirements of the country of origin?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A client demands at least 99.99% uptime from a service provider's hosted security services. Which of the following documents includes the information the service provider should return to the client?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A systems administrator notices that one of the systems critical for processing customer transactions is running an end-of-life operating system. Which of the following techniques would increase enterprise security?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following can best protect against an employee inadvertently installing malware on a company system?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A security professional discovers a folder containing an employee's personal information on the enterprise's shared drive. Which of the following best describes the data type the security professional should use to identify organizational policies and standards concerning the storage of employees' personal information?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)