최신 SY0-701 무료덤프 - CompTIA Security+ Certification
A security engineer at a large company needs to enhance IAM to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is most likely associated with introducing vulnerabilities on a corporate network by the deployment of unapproved software?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
The Chief Information Security Officer wants to discuss options for a disaster recovery site that allows the business to resume operations as quickly as possible. Which of the following solutions meets this requirement?
정답: D
A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers Which of the following solutions is the organization most likely to employ to further increase performance and availability?
정답: B
An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A vendor salesperson is a personal friend of a company's Chief Financial Officer (CFO). The company recently made a large purchase from the vendor, which was directly approved by the CFO. Which of the following best describes this situation?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted?
(Choose two.)
(Choose two.)
정답: D,F
설명: (DumpTOP 회원만 볼 수 있음)
During a recent log review, an analyst discovers evidence of successful injection attacks. Which of the following will best address this issue?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An organization is adopting cloud services at a rapid pace and now has multiple SaaS applications in use.
Each application has a separate log-in. so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first step the security team should take?
Each application has a separate log-in. so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first step the security team should take?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An administrator has configured a quarantine subnet for all guest devices that connect to the network. Which of the following would be best for the security team to configure on the MDM before allowing access to corporate resources?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is the main consideration when a legacy system that is a critical part of a company's infrastructure cannot be replaced?
정답: B
A group of developers has a shared backup account to access the source code repository. Which of the following is the best way to secure the backup account if there is an SSO failure?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst is reviewing logs and discovers the following:

Which of the following should be used lo best mitigate this type of attack?

Which of the following should be used lo best mitigate this type of attack?
정답: D
A security analyst has determined that a security breach would have a financial impact of $15,000 and is expected to occur twice within a three-year period. Which of the following is the ALE for this risk?
정답: D
Which of the following best explains a concern with OS-based vulnerabilities?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)