CompTIA Security+ SY0-601 – Question670

A security analyst has received an alert about PII being sent via email. The analyst's Chief Information Security Officer (CISO) has made it clear that PII must be handled with extreme care. From which of the following did the alert MOST likely originate?


A.
S/MIME
B. DLP
C. IMAP
D. HIDS

Correct Answer: B

CompTIA Security+ SY0-601 – Question669

A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO). Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?


A.
Open the document on an air-gapped network.
B. View the document's metadata for origin clues.
C. Search for matching file hashes on malware websites.
D. Detonate the document in an analysis sandbox.

Correct Answer: D

CompTIA Security+ SY0-601 – Question668

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a protected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?


A.
DNS sinkholing
B. DLP rules on the terminal
C. An IP blacklist
D. Application whitelisting

Correct Answer: D

CompTIA Security+ SY0-601 – Question667

During an incident response, a security analyst observes the following log entry on the web server:

Which of the following BEST describes the type of attack the analyst is experiencing?

A.
SQL injection
B. Cross-site scripting
C. Pass-the-hash
D. Directory traversal

Correct Answer: D

CompTIA Security+ SY0-601 – Question665

A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drives will fail simultaneously. Which of the following RAID configurations should the administrator use?


A.
RAID 0
B. RAID 1
C. RAID 5
D. RAID 10

Correct Answer: C

CompTIA Security+ SY0-601 – Question664

A security engineer at an offline government facility is concerned about the validity of an SSL certificate. The engineer wants to perform the fastest check with the least delay to determine if the certificate has been revoked. Which of the following would BEST meet these requirements?


A.
RA
B. OCSP
C. CRL
D. CSR

Correct Answer: B

CompTIA Security+ SY0-601 – Question663

A security incident may have occurred on the desktop PC of an organization's Chief Executive Officer (CEO). A duplicate copy of the CEO's hard drive must be stored securely to ensure appropriate forensic processes and the chain of custody are followed. Which of the following should be performed to accomplish this task?


A.
Install a new hard drive in the CEO's PC, and then remove the old hard drive and place it in a tamper-evident bag.

B. Connect a write blocker to the hard drive. Then, leveraging a forensic workstation, utilize the dd command in a live Linux environment to create a duplicate copy.

C. Remove the CEO's hard drive from the PC, connect to the forensic workstation, and copy all the contents onto a remote fileshare while the CEO watches.

D. Refrain from completing a forensic analysis of the CEO's hard drive until after the incident is confirmed; duplicating the hard drive at this stage could destroy evidence.

Correct Answer: B

CompTIA Security+ SY0-601 – Question662

A network administrator would like to configure a site-to-site VPN utilizing IPSec. The administrator wants the tunnel to be established with data integrity, encryption, authentication, and anti-replay functions. Which of the following should the administrator use when configuring the VPN?


A.
AH
B. EDR
C. ESP
D. DNSSEC

Correct Answer: C

CompTIA Security+ SY0-601 – Question661

In the middle of a cyberattack, a security engineer removes the infected devices from the network and locks down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?


A.
Identification
B. Preparation
C. Lessons learned
D. Eradication
E. Recovery
F. Containment

Correct Answer: F