Exam 16: CompTIA Security+ 2021

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following will provide the BEST physical security countermeasures to stop intruders? (Choose two.)

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

E,F

A root cause analysis reveals that a web application outage was caused by one of the company's developers uploading a newer version of the third-party libraries that were shared among several applications. Which of the following implementations would be BEST to prevent the issue from reoccurring?

Free
(Multiple Choice)
4.8/5
(46)
Correct Answer:
Verified

C

A network administrator has been asked to install an IDS to improve the security posture of an organization. Which of the following control types is an IDS?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: Check-in/checkout of credentials The ability to use but not know the password Automated password changes Logging of access to credentials Which of the following solutions would meet the requirements?

(Multiple Choice)
4.8/5
(38)

In the middle of a cyberattack, a security engineer removes the infected devices from the network and locks down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?

(Multiple Choice)
4.8/5
(45)

A security assessment determines DES and 3DES are still being used on recently deployed production servers. Which of the following did the assessment identify?

(Multiple Choice)
4.8/5
(23)

The manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:

(Multiple Choice)
4.8/5
(35)

Which of the following would MOST likely support the integrity of a voting machine?

(Multiple Choice)
4.7/5
(35)

Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe's identity before sending him the prize. Which of the following BEST describes this type of email?

(Multiple Choice)
4.9/5
(33)

A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN. Which of the following is the MOST likely reason for the user's inability to connect the laptop to the VPN?

(Multiple Choice)
4.9/5
(24)

A security engineer needs to implement an MDM solution that complies with the corporate mobile device policy. The policy states that in order for mobile users to access corporate resources on their devices, the following requirements must be met: Mobile device OSs must be patched up to the latest release. A screen lock must be enabled (passcode or biometric). Corporate data must be removed if the device is reported lost or stolen. Which of the following controls should the security engineer configure? (Choose two.)

(Multiple Choice)
4.8/5
(28)

An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb worth of inbound network traffic to the server and transfers the pcap back to the machine for analysis. Which of the following tools should the analyst use to further review the pcap?

(Multiple Choice)
4.9/5
(33)

A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL: http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is able to browse the website with the following URL: http://dev-site.comptia.org/home/show.php?sessionID=98988475&loc=us Which of the following application attacks is being tested?

(Multiple Choice)
4.7/5
(28)

A security engineer has enabled two-factor authentication on all workstations. Which of the following approaches are the MOST secure? (Choose two.)

(Multiple Choice)
4.9/5
(31)

Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?

(Multiple Choice)
4.8/5
(37)

An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

(Multiple Choice)
4.7/5
(31)

A security analyst is performing a forensic investigation involving compromised account credentials. Using the Event Viewer, the analyst was able to detect the following message: "Special privileges assigned to new logon." Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of the following attacks is MOST likely being detected?

(Multiple Choice)
4.8/5
(29)

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hotspots?

(Multiple Choice)
4.7/5
(32)

A user received an SMS on a mobile phone that asked for bank details. Which of the following social-engineering techniques was used in this case?

(Multiple Choice)
4.7/5
(35)

A local coffee shop runs a small WiFi hotspot for its customers that utilizes WPA2-PSK. The coffee shop would like to stay current with security trends and wants to implement WPA3 to make its WiFi even more secure. Which of the following technologies will the coffee shop MOST likely use in place of PSK?

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 129
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)