CompTIA Security+ SY0-701 Free Dumps

  1. Home
  2. /
  3. Free Dumps
  4. /
  5. CompTIA Security+ SY0-701 Free...
CompTIA Security+ SY0-701 certification promotion with the logo, headline 'Pass in 3 Days' and 'Pay After You Pass' button, on a clean white background.

Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!

Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!

 

Question 141
0
Please leave a feedback on thisx

Which of the following describes a security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system?

  • A. SIEM
  • B. DLP
  • C. IDS
  • D. SNMP

 

 

 

 

Question 142
0
Please leave a feedback on thisx

A network manager wants to protect the company’s VPN by implementing multifactor authentication that uses:

Something you know –

Something you have –

Something you are –
Which of the following would accomplish the manager’s goal?

  • A. Domain name, PKI, GeoIP lookup
  • B. VPN IP address, company ID, facial structure
  • C. Password, authentication token, thumbprint
  • D. Company URL, TLS certificate, home address

 

 

 

 

Question 143
0
Please leave a feedback on thisx

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

  • A. Segmentation
  • B. Isolation
  • C. Hardening
  • D. Decommissioning

 

 

 

 

Question 144
0
Please leave a feedback on thisx

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

  • A. VM escape
  • B. SQL injection
  • C. Buffer overflow
  • D. Race condition

 

 

 

 

Question 145
0
Please leave a feedback on thisx

After a company was compromised, customers initiated a lawsuit. The company’s attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?

  • A. Retain the emails between the security team and affected customers for 30 days.
  • B. Retain any communications related to the security breach until further notice.
  • C. Retain any communications between security members during the breach response.
  • D. Retain all emails from the company to affected customers for an indefinite period of time.

 

 

 

Question 146
0
Please leave a feedback on thisx

Which of the following describes the process of concealing code or text inside a graphical image?

  • A. Symmetric encryption
  • B. Hashing
  • C. Data masking
  • D. Steganography

 

 

 

Question 147
0
Please leave a feedback on thisx

An employee receives a text message from an unknown number claiming to be the company’s Chief Executive Officer and asking the employee to purchase several gift cards. Which of the following types of attacks does this describe?

  • A. Vishing
  • B. Smishing
  • C. Pretexting
  • D. Phishing

 

 

 

 

Question 148
0
Please leave a feedback on thisx

Which of the following risk management strategies should an enterprise adopt first if a legacy application is critical to business operations and there are preventative controls that are not yet implemented?

  • A. Mitigate
  • B. Accept
  • C. Transfer
  • D. Avoid

 

 

 

Question 149
0
Please leave a feedback on thisx

Security analysts are conducting an investigation of an attack that occurred inside the organization’s network. An attacker was able to collect network traffic between workstations throughout the network. The analysts review the following logs:

Security+_SY0-701_149__Certget

The Layer 2 address table has hundreds of entries similar to the ones above. Which of the following attacks has MOST likely occurred?

  • A. SQL injection
  • B. DNS spoofing
  • C. MAC flooding
  • D. ARP poisoning

 

 

 

 

 

Question 150
0
Please leave a feedback on thisx

The local administrator account for a company’s VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have most likely prevented this from happening?

  • A. Using least privilege
  • B. Changing the default password
  • C. Assigning individual user IDs
  • D. Reviewing logs more frequently

 

 

 

 

 

 

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
error: Content is protected !!