CompTIA Security+ SY0-601 – Question120

As part of a security compliance assessment, an auditor performs automated vulnerability scans. In addition,
which of the following should the auditor do to complete the assessment?


A.
User behavior analysis
B. Packet captures
C. Configuration reviews
D. Log analysis

Correct Answer: D

CompTIA Security+ SY0-601 – Question118

A security proposal was set up to track requests for remote access by creating a baseline of the users'
common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which
of the following should be configured in order to deploy the proposal?


A.
Context-aware authentication
B. Simultaneous authentication of equals
C. Extensive authentication protocol
D. Agentless network access control

Correct Answer: A

CompTIA Security+ SY0-601 – Question117

An employee received a word processing file that was delivered as an email attachment. The subject line and
email content enticed the employee to open the attachment. Which of the following attack vectors BEST
matches this malware?


A.
Embedded Python code
B. Macro-enabled file
C. Bash scripting
D. Credential-harvesting website

Correct Answer: B

CompTIA Security+ SY0-601 – Question114

DDoS attacks are causing an overload on the cluster of cloud servers. A security architect is researching
alternatives to make the cloud environment respond to load fluctuation in a cost-effective way. Which of the
following options BEST fulfills the architect's requirements?


A.
An orchestration solution that can adjust scalability of cloud assets
B. Use of multipath by adding more connections to cloud storage
C. Cloud assets replicated on geographically distributed regions
D. An on-site backup that is displayed and only used when the load increases

Correct Answer: A

CompTIA Security+ SY0-601 – Question112

The board of directors at a company contracted with an insurance firm to limit the organization's liability. Which
of the following risk management practices does this BEST describe?


A.
Transference
B. Avoidance
C. Mitigation
D. Acknowledgement

Correct Answer: A

CompTIA Security+ SY0-601 – Question111

The Chief Information Security Officer wants to prevent exfiltration of sensitive information from employee cell
phones when using public USB power charging stations. Which of the following would be the BEST solution to
implement?


A.
DLP
B. USB data blocker
C. USB OTG
D. Disabling USB ports

Correct Answer: B