CompTIA Security+ SY0-601 – Question320

Ann, a customer, received a notification from her mortgage company stating her PII may be shared with
partners, affiliates, and associates to maintain day-to-day business operations. Which of the following
documents did Ann receive?


A.
An annual privacy notice
B. A non-disclosure agreement
C. A privileged-user agreement
D. A memorandum of understanding

Correct Answer: A

CompTIA Security+ SY0-601 – Question318

Which of the following BEST describes data streams that are compiled through artificial intelligence that
provides insight on current cyberintrusions, phishing, and other malicious cyberactivity?


A.
Intelligence fusion
B. Review reports
C. Log reviews
D. Threat feeds

Correct Answer: D

CompTIA Security+ SY0-601 – Question317

A security team discovered a large number of company-issued devices with non-work-related software
installed. Which of the following policies would MOST likely contain language that would prohibit this activity?


A.
NDA
B. BPA
C. AUP
D. SLA

Correct Answer: C

CompTIA Security+ SY0-601 – Question316

A security administrator needs to block a TCP connection using the corporate firewall. Because this connection
is potentially a threat, the administrator does not want to send back an RST. Which of the following actions in
the firewall rule would work BEST?


A.
Drop
B. Reject
C. Log alert
D. Permit

Correct Answer: A

CompTIA Security+ SY0-601 – Question315

Which of the following is an example of risk avoidance?


A.
Installing security updates directly in production to expedite vulnerability fixes
B. Buying insurance to prepare for financial loss associated with exploits
C. Not installing new software to prevent compatibility errors
D. Not taking preventive measures to stop the theft of equipment

Correct Answer: C

Explanation:

Reference: https://reciprocity.com/resources/what-is-risk-avoidance/#:~:text=A…
20avoidance,in%20case%20of%20a%20cyberattack

CompTIA Security+ SY0-601 – Question314

The technology department at a large global company is expanding its Wi-Fi network infrastructure at the
headquarters building. Which of the following should be closely coordinated between the technology,
cybersecurity, and physical security departments? Select 1


A.
Authentication protocol
B. Encryption type
C. WAP placement
D. VPN configuration

Correct Answer: C

Explanation:

CompTIA Security+ SY0-601 – Question312

Which of the following involves the inclusion of code in the main codebase as soon as it is written?


A.
Continuous monitoring
B. Continuous deployment
C. Continuous validation
D. Continuous integration

Correct Answer: D

Explanation:

Reference: https://stackify.com/continuous-delivery-vs-continuous-deployment-v…
#:~:text=Continuous%20integration%20is%20the%20process,branch%20as%20quickly%20as%20possible