An engineer wants to inspect traffic to a cluster of web servers in a cloud environment. Which of the following
solutions should the engineer implement?
A security team suspects that the cause of recent power consumption overloads is the unauthorized use of
empty power outlets in the network rack. Which of the following options will mitigate this issue without
compromising the number of outlets available?
A. Adding a new UPS dedicated to the rack B. Installing a managed PDU C. Using only a dual power supplies unit D. Increasing power generator capacity
A company received a "right to be forgotten" request. To legally comply, the company must remove data related
to the requester from its systems. Which of the following is the company MOST likely complying with?
A network-connected magnetic resonance imaging (MRI) scanner at a hospital is controlled and operated by an
outdated and unsupported specialized Windows OS. Which of the following is MOST likely preventing the IT
manager at the hospital from upgrading the specialized OS?
A. The time needed for the MRI vendor to upgrade the system would negatively impact patients. B. The MRI vendor does not support newer versions of the OS. C. Changing the OS breaches a support SLA with the MRI vendor. D. The IT team does not have the budget required to upgrade the MRI scanner.
A retail executive recently accepted a job with a major competitor. The following week, a security analyst
reviews the security logs and identifies successful logon attempts to access the departed executive's accounts.
Which of the following security practices would have addressed the issue?
A. A non-disclosure agreement B. Least privilege C. An acceptable use policy D. Offboarding
The marketing department at a retail company wants to publish an internal website to the internet so it is
reachable by a limited number of specific, external service providers in a secure manner. Which of the following
configurations would be BEST to fulfil this requirement?
A candidate attempts to go to http://comptia.org but accidentally visits http://comptiia.org. The malicious website
looks exactly like the legitimate website. Which of the following BEST describes this type of attack?
A. Reconnaissance B. Impersonation C. Typosquatting D. Watering-hole
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicate a
directory traversal attack has occurred. Which of the following is the analyst MOST likely seeing?
A global pandemic is forcing a private organization to close some business units and reduce staffing at others.
Which of the following would be BEST to help the organization's executives determine their next course of
action?
A. An incident response plan B. A communication plan C. A disaster recovery plan D. A business continuity plan
As part of the building process for a web application, the compliance team requires that all PKI certificates are
rotated annually and can only contain wildcards at the secondary subdomain level. Which of the following
certificate properties will meet these requirements?
A. HTTPS://*.comptia.org, Valid from April 10 00:00:00 2021 – April 8 12:00:00 2022 B.HTTPS://app1.comptia.org, Valid from April 10 00:00:00 2021 – April 8 12:00:00 2022 C. HTTPS://*.app1.comptia.org, Valid from April 10 00:00:00 2021 – April 8 12:00:00 2022 D. HTTPS://*.comptia.org, Valid from April 10 00:00:00 2021 – April 8 12:00:00 2023
Correct Answer: C
Please disable your adblocker or whitelist this site!