CompTIA Security+ SY0-601 – Question170

A major political party experienced a server breach. The hacker then publicly posted stolen internal
communications concerning campaign strategies to give the opposition party an advantage. Which of the
following BEST describes these threat actors?


A.
Semi-authorized hackers
B. State actors
C. Script kiddies
D. Advanced persistent threats

CompTIA Security+ SY0-601 – Question169

A user wanted to catch up on some work over the weekend but had issues logging in to the corporate network
using a VPN. On Monday, the user opened a ticket for this issue but was able to log in successfully. Which of
the following BEST describes the policy that is being implemented?


A.
Time-based logins
B. Geofencing
C. Network location
D. Password history

Correct Answer: B

CompTIA Security+ SY0-601 – Question168

A company is under investigation for possible fraud. As part of the investigation, the authorities need to review
all emails and ensure data is not deleted. Which of the following should the company implement to assist in the
investigation?


A.
Legal hold
B. Chain of custody
C. Data loss prevention
D. Content filter

Correct Answer: A

CompTIA Security+ SY0-601 – Question167

A company wants to improve end users' experiences when they log in to a trusted partner website. The
company does not want the users to be issued separate credentials for the partner website. Which of the
following should be implemented to allow users to authenticate using their own credentials to log in to the
trusted partner's website?


A.
Directory service
B. AAA server
C. Federation
D. Multifactor authentication

Correct Answer: C

CompTIA Security+ SY0-601 – Question166

An untrusted SSL certificate was discovered during the most recent vulnerability scan. A security analyst
determines the certificate is signed properly and is a valid wildcard. This same certificate is installed on the
other company servers without issue. Which of the following is the MOST likely reason for this finding?


A.
The required intermediate certificate is not loaded as part of the certificate chain.
B. The certificate is on the CRL and is no longer valid.
C. The corporate CA has expired on every server, causing the certificate to fail verification.
D. The scanner is incorrectly configured to not trust this certificate when detected on the server.

Correct Answer: D

CompTIA Security+ SY0-601 – Question165

A company discovered that terabytes of data have been exfiltrated over the past year after an employee clicked
on an email link. The threat continued to evolve and remain undetected until a security analyst noticed an
abnormal amount of external connections when the employee was not working. Which of the following is the
MOST likely threat actor?


A.
Shadow IT
B. Script kiddies
C. APT
D. Insider threat

Correct Answer: D

CompTIA Security+ SY0-601 – Question164

Two hospitals merged into a single organization. The privacy officer requested a review of all records to ensure
encryption was used during record storage, in compliance with regulations. During the review, the officer
discovered that medical diagnosis codes and patient names were left unsecured. Which of the following types
of data does this combination BEST represent?


A.
Personal health information
B. Personally identifiable information
C. Tokenized data
D. Proprietary data

Correct Answer: B

CompTIA Security+ SY0-601 – Question163

On the way into a secure building, an unknown individual strikes up a conversation with an employee. The
employee scans the required badge at the door while the unknown individual holds the door open, seemingly
out of courtesy, for the employee. Which of the following social engineering techniques is being utilized?


A.
Shoulder surfing
B. Watering-hole attack
C. Tailgating
D. Impersonation

Correct Answer: C

CompTIA Security+ SY0-601 – Question162

The Chief Information Security Officer is concerned about employees using personal email rather than
company email to communicate with clients and sending sensitive business information and PII. Which of the
following would be the BEST solution to install on the employees' workstations to prevent information from
leaving the company's network?


A.
HIPS
B. DLP
C. HIDS
D. EDR

Correct Answer: B

CompTIA Security+ SY0-601 – Question161

Users are presented with a banner upon each login to a workstation. The banner mentions that users are not
entitled to any reasonable expectation of privacy and access is for authorized personnel only. In order to
proceed past that banner, users must click the OK button. Which of the following is this an example of?


A.
AUP
B. NDA
C. SLA
D. MOU

Correct Answer: A