CompTIA Security+ SY0-601 – Question580

A user would like to install software and features that are not available with a mobile device's default software.
Which of the following would all the user to install unauthorized software and enable new features?


A.
SQLi
B. Cross-site scripting
C. Jailbreaking
D. Side loading

Correct Answer: C

CompTIA Security+ SY0-601 – Question578

A company would like to provide flexibility for employees on device preference. However, the company is concerned about supporting too many different types of hardware. Which of the following deployment models will provide the needed flexibility with the greatest amount of control and security over company data and infrastructure?


A.
BYOD
B. VDI
C. COPE
D. CYOD

Correct Answer: B

CompTIA Security+ SY0-601 – Question577

A company recently experienced a major breach. An investigation concludes that customer credit card data was stolen and exfiltrated through a dedicated business partner connection to a vendor, who is not held to the same security control standards. Which of the following is the most likely source of the breach?


A.
Side channel
B. Supply chain
C. Cryptographic downgrade
D. Malware

Correct Answer: B

CompTIA Security+ SY0-601 – Question576

A security analyst is scanning a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?


A.
Changing the remote desktop port to a non-standard number
B. Setting up a VPN and placing the jump server inside the firewall
C. Using a proxy for web connections from the remote desktop server
D. Connecting the remote server to the domain and increasing the password length

Correct Answer: B

CompTIA Security+ SY0-601 – Question575

An organization relies on third-party videoconferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources. Which of the following would best maintain high-quality videoconferencing while minimizing latency when connected to the VPN?


A.
Using geographic diversity to have VPN terminators closer to end users
B. Utilizing split tunneling so only traffic for corporate resources is encrypted
C. Purchasing higher bandwidth connections to meet the increased demand
D. Configuring QoS properly on the VPN accelerators

Correct Answer: B

CompTIA Security+ SY0-601 – Question574

A company is planning to install a guest wireless network so visitors will be able to access the internet. The stakeholders want the network to be easy to connect to so time is not wasted during meetings. The WAPs are configured so that power levels and antennas cover only the conference rooms where visitors will attend meetings. Which of the following would best protect the company's internal wireless network against visitors accessing company resources?


A.
Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network.
B. Change the password for the guest wireless network every month.
C. Decrease the power levels of the access points for the guest wireless network.
D. Enable WPA2 using 802.1X for logging on to the guest wireless network.

Correct Answer: A

CompTIA Security+ SY0-601 – Question572

A company develops a complex platform that is composed of a single application. After several issues with upgrades, the systems administrator recommends breaking down the application into unique, independent modules. Which of the following best identifies the systems administrator's recommendation?


A.
Virtualization
B. Serverless
C. Microservices
D. API gateway

Correct Answer: C

CompTIA Security+ SY0-601 – Question571

A financial analyst is expecting an email containing sensitive information from a client. When the email arrives the analyst receives an error and is unable to open the encrypted message. Which of the following is the most likely cause of the issue?


A.
The S/MIME plug-in is not enabled
B. The SSL certificate has expired
C. Secure IMAP was not implemented
D. POP3S is not supported

Correct Answer: A