CompTIA Security+ SY0-601 – Question210

An attacker browses a company's online job board attempting to find any relevant information regarding the
technologies the company uses. Which of the following BEST describes this social engineering technique?


A.
Hoax
B. Reconnaissance
C. Impersonation
D. Pretexting

Correct Answer: B

CompTIA Security+ SY0-601 – Question209

A security engineer must deploy two wireless routers in an office suite. Other tenants in the office building
should not be able to connect to this wireless network. Which of the following protocols should the engineer
implement to ensure the STRONGEST encryption?


A.
WPS
B. WPA2
C. WAP
D. HTTPS

Correct Answer: B

CompTIA Security+ SY0-601 – Question208

An analyst is reviewing logs associated with an attack. The logs indicate an attacker downloaded a malicious
file that was quarantined by the AV solution. The attacker utilized a local non-administrative account to restore
the malicious file to a new location. The file was then used by another process to execute a payload. Which of
the following attacks did the analyst observe?


A.
Privilege escalation
B. Request forgeries
C. Injection
D. Replay attack

Correct Answer: A

CompTIA Security+ SY0-601 – Question206

The Chief Information Security Officer (CISO) of a bank recently updated the incident response policy. The
CISO is concerned that members of the incident response team do not understand their roles. The bank wants
to test the policy but with the least amount of resources or impact. Which of the following BEST meets the
requirements?


A.
Warm site failover
B. Tabletop walk-through
C. Parallel path testing
D. Full outage simulation

Correct Answer: B

CompTIA Security+ SY0-601 – Question204

An organization would like to give remote workers the ability to use applications hosted inside the corporate
network. Users will be allowed to use their personal computers, or they will be provided organization assets.
Either way, no data or applications will be installed locally on any user systems. Which of the following mobile
solutions would accomplish these goals?


A.
VDI
B. MDM
C. COPE
D. UTM

Correct Answer: A