CompTIA Security+ Exam SY0-701 Dumps
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary cause of workstations on the LAN becoming infected with malware?

  • IPS
  • Forward proxy
  • HIDS
  • Awareness training (correct)
  • Which biometric authentication method is based on recognizing the unique pattern of blood vessels in the retina?

  • Gait
  • Retina (correct)
  • Signature
  • Voice
  • Why are users on the LAN being tricked into clicking on malicious URLs?

  • Lack of antivirus software
  • Incorrect DNS settings
  • Weak encryption protocols
  • No internal controls exist to evaluate URL safety (correct)
  • What makes retina authentication virtually impossible to duplicate or bypass?

    <p>Unique pattern of blood vessels</p> Signup and view all the answers

    What is the common purpose of a RAT (Remote Access Trojan) when infecting a computer?

    <p>Stealthy unauthorized access</p> Signup and view all the answers

    What technology should be implemented to educate users about the risks associated with clicking on malicious URLs?

    <p>Awareness training</p> Signup and view all the answers

    What is the primary concern a company using drones for perimeter monitoring should have?

    <p>Privacy</p> Signup and view all the answers

    Why has the malware in the scenario evaded detection by traditional antivirus software?

    <p>Utilizes polymorphic techniques</p> Signup and view all the answers

    Which factor might raise privacy concerns when using drones for perimeter monitoring?

    <p>Collecting video and images of individuals</p> Signup and view all the answers

    What feature of a worm differentiates it from other types of malware?

    <p>Exploits system vulnerabilities to spread autonomously</p> Signup and view all the answers

    What security measure can a company using drones implement to address privacy concerns?

    <p>Restricting access to telemetry data</p> Signup and view all the answers

    How does adding a software application to the whitelist help resolve issues related to security policies blocking its execution?

    <p>Allows the program to run without any restrictions</p> Signup and view all the answers

    What is the primary role of the white team during a penetration testing exercise?

    <p>Providing oversight and support</p> Signup and view all the answers

    Which team determines the rules and guidelines of a penetration testing exercise?

    <p>Purple team</p> Signup and view all the answers

    What type of document did Ann receive from her mortgage company regarding sharing her PII?

    <p>Annual privacy notice</p> Signup and view all the answers

    In a penetration testing exercise, which team is responsible for monitoring the progress of the teams?

    <p>Green team</p> Signup and view all the answers

    What is the main purpose of an annual privacy notice from a financial institution?

    <p>Outlining the institution's privacy policy</p> Signup and view all the answers

    Which team in a penetration testing exercise is responsible for providing feedback on security measures?

    <p>Green team</p> Signup and view all the answers

    What is the primary concern the stakeholders have with the guest wireless network?

    <p>Minimizing disruptions during meetings</p> Signup and view all the answers

    Which aspect of the WAPs' configuration helps in restricting access to only the conference rooms?

    <p>Decreased power levels and antenna coverage</p> Signup and view all the answers

    How does configuring the guest wireless network on a separate VLAN protect the company's internal network?

    <p>It isolates guest traffic from company resources</p> Signup and view all the answers

    What security measure would be least effective in preventing visitors from accessing company resources?

    <p>Decreasing the power levels of access points</p> Signup and view all the answers

    Which action would be most appropriate if the company wanted to enhance security further without hindering visitor access?

    <p>Employing intrusion detection systems on the guest network</p> Signup and view all the answers

    What additional step could be taken to ensure that the guest wireless network remains isolated from the company's internal resources?

    <p>'Regular penetration testing on the guest network</p> Signup and view all the answers

    What is the main purpose of hacktivists using cyberattacks?

    <p>To disrupt services and expose information</p> Signup and view all the answers

    Which term describes a sovereign state with a centralized government and defined territory?

    <p>Nation-state</p> Signup and view all the answers

    Who are nation-state actors?

    <p>Individuals or groups conducting cyberattacks on behalf of a nation-state</p> Signup and view all the answers

    What are some reasons nation-state actors may target others?

    <p>For espionage, sabotage, influence, or retaliation</p> Signup and view all the answers

    What does SIEM stand for?

    <p>Security Information and Event Management</p> Signup and view all the answers

    How does SIEM help in cybersecurity?

    <p>By providing real-time monitoring and alerting of security events</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser