CompTIA Security+ SY0-601 – Question410

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible
Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Choose two.)


A.
MAC filtering
B. Zero trust segmentation
C. Network access control
D. Access control vestibules
E. Guards
F. Bollards

Correct Answer: AC

CompTIA Security+ SY0-601 – Question408

Which of the following social engineering attacks BEST describes an email that is primarily intended to mislead
recipients into forwarding the email to others?


A.
Hoaxing
B. Pharming
C. Watering-hole
D. Phishing

Correct Answer: D

Explanation:

Reference: https://www.imperva.com/learn/application-security/social-engineeri…
#:~:text=Phishing,curiosity%20or%20fear%20in%20victims

CompTIA Security+ SY0-601 – Question407

Which of the following scenarios BEST describes a risk reduction technique?


A.
A security control objective cannot be met through a technical change, so the company purchases
insurance and is no longer concerned about losses from data breaches.

B. A security control objective cannot be met through a technical change, so the company implements a policy
to train users on a more secure method of operation.

C. A security control objective cannot be met through a technical change, so the company performs regular
audits to determine if violations have occurred.

D. A security control objective cannot be met through a technical change, so the Chief Information Officer
decides to sign off on the risk.

Correct Answer: B

CompTIA Security+ SY0-601 – Question406

An organization has expanded its operations by opening a remote office. The new office is fully furnished with
office resources to support up to 50 employees working on any given day. Which of the following VPN solutions
would BEST support the new office?


A.
Always-on
B. Remote access
C. Site-to-site
D. Full tunnel

Correct Answer: C

Explanation:

Reference: https://www.paloaltonetworks.com/cyberpedia/what-is-a-site-to-site-…
2Dsite%20virtual,to%20using%20private%20MPLS%20circuits

CompTIA Security+ SY0-601 – Question404

Which of the following secure application development concepts aims to block verbose error messages from
being shown in a user's interface?


A.
OWASP
B. Obfuscation/camouflage
C. Test environment
D. Prevention of information exposure

Correct Answer: D

CompTIA Security+ SY0-601 – Question403

An organization would like to remediate the risk associated with its cloud service provider not meeting its
advertised 99.999% availability metrics. Which of the following should the organization consult for the exact
requirements for the cloud provider?


A.
SLA
B. BPA
C. NDA
D. MOU

CompTIA Security+ SY0-601 – Question402

A company is launching a website in a different country in order to capture user information that a marketing
business can use. The company itself will not be using the information. Which of the following roles is the
company assuming?


A.
Data owner
B. Data processor
C. Data steward
D. Data collector

Correct Answer: D