New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SY0-601 Exam Dumps - CompTIA Security+ Exam 2023

Go to page:
Question # 193

Which of the following ensures an organization can continue to do business with minimal interruption in the event of a major disaster?

A.

Business recovery plan

B.

Incident response plan

C.

Communication plan

D.

Continuity of operations plan

Full Access
Question # 194

A security analyst receives reports of widespread password login attempts for most of the administrator accounts in the environment. Logs indicate that a successful login occurred and the same credentials are being used to attempt to gain access to other resources. Which of the following would best prevent this type of attack from being successful?

A.

Multifactor authentication

B.

Password hygiene

C.

Key rotation

D.

IPSec certificates

E.

802.1X

Full Access
Question # 195

Which of the following attributes would be the most appropriate to apply when implementing MFA?

A.

Validating the user's location

B.

Requiring the user to identify images based on content

C.

Having the user agree to terms of service

D.

Enforcing the inclusion of special characters in user passwords

Full Access
Question # 196

An audit report showed that a former employee saved the following files to an external USB drive before the employee's termination date:

• annual_tax_form.pdf

• encrypted_passwords.db

• team_picture.jpg

• contactjist.db

• human_resources.txt

Which of the following could the former employee do to potentially compromise corporate credentials?

A.

Perform an offline brute-force attack.

B.

Use the files to create a rainbow table.

C.

Conduct a token replay.

D.

Release a network dictionary attack

Full Access
Question # 197

A company would like to implement a secure process for managing headless servers remotely Which of the following should the company most likely implement?

A.

SSH

B.

HTTPS

C.

FTPS

D.

LDAPS

Full Access
Question # 198

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

A.

Insider

B.

Unskilled attacker

C.

Nation-state

D.

Hacktivist

Full Access
Question # 199

The security team installed video cameras in a prominent location in the building lobby. Which of the following best describe this type of control? (Select two).

A.

Technical

B.

Detective

C.

Deterrent

D.

Managerial

E.

Compensating

F.

Corrective

Full Access
Question # 200

To improve the security at a data center, a security administrator implements a CCTV system and posts several signs about the possibility of being filmed. Which of the following best describe these types of controls? (Select two).

A.

Preventive

B.

Deterrent

C.

Corrective

D.

Directive

E.

Compensating

F.

Detective

Full Access
Go to page: