CompTIA Security+ SY0-601 – Question600

An administrator identifies some locations on the third floor of the building that have a poor wireless signal Multiple users confirm the incident and report it is not an isolated event. Which of the following should the administrator use to find the areas with a poor or non-existent wireless signal?


A.
Heat map
B. Input validation
C. Site survey
D. Embedded systems

Correct Answer: C

CompTIA Security+ SY0-601 – Question599

An audit report indicates multiple suspicious attempts to access company resources were made. These attempts were not detected by the company. Which of the following would be the best solution to implement on the company's network?


A.
Intrusion prevention system
B. Proxy server
C. Jump server
D. Security zones

Correct Answer: A

CompTIA Security+ SY0-601 – Question598

Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day to-day work activities?


A.
Encrypted
B. Intellectual property
C. Critical
D. Data in transit

Correct Answer: B

CompTIA Security+ SY0-601 – Question596

A security engineer is hardening existing solutions to reduce application vulnerabilities. Which of the following solutions should the engineer implement FIRST? (Choose two.)


A.
Auto-update
B. HTTP headers
C. Secure cookies
D. Third-party updates
E. Full disk encryption
F. Sandboxing
G. Hardware encryption

Correct Answer: AF

CompTIA Security+ SY0-601 – Question594

Sales team members have been receiving threatening voicemail messages and have reported these incidents to the IT security team. Which of the following would be MOST appropriate for the IT security team to analyze?


A.
Access control
B. Syslog
C. Session Initiation Protocol traffic logs
D. Application logs

Correct Answer: C

CompTIA Security+ SY0-601 – Question593

An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to implement mitigation techniques to prevent further spread. Which of the following is the best course of action for the analyst to take?


A.
Apply a DLP solution
B. Implement network segmentation
C. Utilize email content filtering.
D. Isolate the infected attachment

Correct Answer: B

CompTIA Security+ SY0-601 – Question592

A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?


A.
SPF
B. GPO
C. NAC
D. FIM

Correct Answer: D

CompTIA Security+ SY0-601 – Question591

A dynamic application vulnerability scan identified that code injection could be performed using a web form.
Which of the following will be the best remediation to prevent this vulnerability?


A.
Implement input validations
B. Deploy MFA
C. Utilize a WAF
D. Configure HIPS

Correct Answer: A