Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SY0-701 Exam Dumps - CompTIA Security+ Exam 2024

Go to page:
Question # 17

An organization has a new regulatory requirement to implement corrective controls on a financial system. Which of the following is the most likely reason for the new requirement?

A.

To defend against insider threats altering banking details

B.

To ensure that errors are not passed to other systems

C.

To allow for business insurance to be purchased

D.

To prevent unauthorized changes to financial data

Full Access
Question # 18

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

A.

Application

B.

Authentication

C.

DHCP

D.

Network

E.

Firewall

F.

Database

Full Access
Question # 19

Which of the following can a security director use to prioritize vulnerability patching within a company's IT environment?

A.

SOAR

B.

CVSS

C.

SIEM

D.

CVE

Full Access
Question # 20

A systems administrator is auditing all company servers to ensure. They meet the minimum security baseline While auditing a Linux server, the systems administrator observes the /etc/shadow file has permissions beyond the baseline recommendation. Which of the following commands should the systems administrator use to resolve this issue?

A.

chmod

B.

grep

C.

dd

D.

passwd

Full Access
Question # 21

Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resources?

A.

SLA

B.

MOU

C.

MOA

D.

BPA

Full Access
Question # 22

An analyst is reviewing an incident in which a user clicked on a link in a phishing email. Which of the following log sources would the analyst utilize to determine whether the connection was successful?

A.

Network

B.

System

C.

Application

D.

Authentication

Full Access
Question # 23

In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following best describes the security engineer's response?

A.

Risk tolerance

B.

Risk acceptance

C.

Risk importance

D.

Risk appetite

Full Access
Question # 24

Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?

A.

Availability

B.

Accounting

C.

Authentication

D.

Authorization

Full Access
Go to page: