CompTIA Security+ SY0-601 – Question650

Joe, a user at a company, clicked an email link that led to a website that infected his workstation. Joe was connected to the network, and the virus spread to the network shares. The protective measures failed to stop this virus, and it has continued to evade detection. Which of the following should a security administrator implement to protect the environment from this malware?


A.
Install a definition-based antivirus.
B. Implement an IDS/IPS.
C. Implement a heuristic behavior-detection solution.
D. Implement CASB to protect the network shares.

Correct Answer: C

CompTIA Security+ SY0-601 – Question649

A software developer needs to perform code-execution testing, black-box testing, and non- functional testing on a new product before its general release. Which of the following BEST describes the tasks the developer is conducting?


A.
Verification
B. Validation
C. Normalization
D. Staging

Correct Answer: B

CompTIA Security+ SY0-601 – Question648

The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve security in the environment and protect patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have not been provided to frontline staff, and a risk analysis has not been performed. Which of the following is the MOST likely cause of the CRO's concerns?


A.
SSO would simplify username and password management, making it easier for hackers to guess accounts.
B. SSO would reduce password fatigue, but staff would still need to remember more complex passwords.
C. SSO would reduce the password complexity for frontline staff.
D. SSO would reduce the resilience and availability of systems if the identity provider goes offline.

Correct Answer: D

CompTIA Security+ SY0-601 – Question647

A root cause analysis reveals that a web application outage was caused by one of the company's developers uploading a newer version of the third-party libraries that were shared among several applications. Which of the following implementations would be BEST to prevent this issue from reoccurring?


A.
CASB
B. SWG
C. Containerization
D. Automated failover

Correct Answer: C

CompTIA Security+ SY0-601 – Question646

An analyst visits an Internet forum looking for information about a tool. The analyst finds a thread that appears to contain relevant information. One of the posts says the following:

Which of the following BEST describes the attack that was attempted against the forum readers?

A.
SQLi attack
B. DLL attack
C. XSS attack
D. API attack

Correct Answer: C

CompTIA Security+ SY0-601 – Question645

After entering a username and password, an administrator must draw a gesture on a touch screen. Which of the following demonstrates what the administrator is providing?


A.
Multifactor authentication
B. Something you can do
C. Biometrics
D. Two-factor authentication

Correct Answer: B

CompTIA Security+ SY0-601 – Question644

A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?


A.
Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis.
B. Restrict administrative privileges and patch all systems and applications.
C. Rebuild all workstations and install new antivirus software.
D. Implement application whitelisting and perform user application hardening.

Correct Answer: B

CompTIA Security+ SY0-601 – Question643

Which of the following describes the BEST approach for deploying application patches?


A.
Apply the patches to systems in a testing environment, then to systems in a staging environment, and finally to production systems.

B. Test the patches in a staging environment, develop against them in the development environment, and then apply them to the production systems.

C. Test the patches in a test environment, apply them to the production systems, and then apply them to a staging environment.

D. Apply the patches to the production systems, apply them in a staging environment, and then test all of them in a testing environment.

Correct Answer: A

CompTIA Security+ SY0-601 – Question642

When selecting a technical solution for identity management, an architect chooses to go from an in-house solution to a third-party SaaS provider. Which of the following risk management strategies is this an example of?


A.
Acceptance
B. Mitigation
C. Avoidance
D. Transference

Correct Answer: D

CompTIA Security+ SY0-601 – Question641

A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections.
The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?


A.
Create an OCSP.
B. Generate a CSR.
C. Create a CRL.
D. Generate a .pfx file.

Correct Answer: B