CompTIA SecurityX v1.0

Page:    1 / 5   
Exam contains 74 questions

The company's client service team is receiving a large number of inquiries from clients regarding a new vulnerability. Which of the following would provide the customer service team with a consistent message to deliver directly to clients?

  • A. Communication plan
  • B. Response playbook
  • C. Disaster recovery procedure
  • D. Automated runbook


Answer : B

A company wants to use a process to embed a sign of ownership covertly inside a proprietary document without adding any identifying attributes. Which of the following would be best to use as part of the process to support copyright protections of the document?

  • A. Steganography
  • B. E-signature
  • C. Watermarking
  • D. Cryptography


Answer : A

Which of the following utilizes policies that route packets to ensure only specific types of traffic are being sent to the correct destination based on application usage?

  • A. SDN
  • B. pcap
  • C. vmstat
  • D. DNSSEC
  • E. VPC


Answer : A

An incident response team completed recovery from offline backup for several workstations. The workstations were subjected to a ransomware attack after users fell victim to a spear-phishing campaign, despite a robust training program. Which of the following questions should be considered during the lessons-learned phase to most likely reduce the risk of reoccurrence? (Choose two.)

  • A. Are there opportunities for legal recourse against the originators of the spear-phishing campaign?
  • B. What internal and external stakeholders need to be notified of the breach?
  • C. Which methods can be implemented to increase speed of offline backup recovery?
  • D. What measurable user behaviors were exhibited that contributed to the compromise?
  • E. Which technical controls, if implemented, would provide defense when user training fails?
  • F. Which user roles are most often targeted by spear phishing attacks?


Answer : DE

Two companies that recently merged would like to unify application access between the companies, without initially merging internal authentication stores. Which of the following technical strategies would best meet this objective?

  • A. Federation
  • B. RADIUS
  • C. TACACS+
  • D. MFA
  • E. ABAC


Answer : A

An analyst needs to evaluate all images and documents that are publicly shared on a website. Which of the following would be the best tool to evaluate the metadata of these files?

  • A. OllyDbg
  • B. ExifTool
  • C. Volatility
  • D. Ghidra


Answer : B

An organization has deployed a cloud-based application that provides virtual event services globally to clients. During a typical event, thousands of users access various entry pages within a short period of time. The entry pages include sponsor-related content that is relatively static and is pulled from a database. When the first major event occurs, users report poor response time on the entry pages. Which of the following features is the most appropriate for the company to implement?

  • A. Horizontal scalability
  • B. Vertical scalability
  • C. Containerization
  • D. Static code analysis
  • E. Caching


Answer : E

An organization's board of directors has asked the Chief Information Security Officer to build a third-party management program. Which of the following best explains a reason for this request?

  • A. Risk transference
  • B. Supply chain visibility
  • C. Support availability
  • D. Vulnerability management


Answer : B

A company is rewriting a vulnerable application and adding the mprotect() system call in multiple parts of the application's code that was being leveraged by a recent exploitation tool. Which of the following should be enabled to ensure the application can leverage the new system call against similar attacks in the future?

  • A. TPM
  • B. Secure boot
  • C. NX bit
  • D. HSM


Answer : C

Which of the following items should be included when crafting a disaster recovery plan?

  • A. Redundancy
  • B. Testing exercises
  • C. Autoscaling
  • D. Competitor locations


Answer : B

A web application server is running a legacy operating system with an unpatched RCE vulnerability. The server cannot be upgraded until the corresponding application code is changed. Which of the following compensating controls would best prevent successful exploitation?

  • A. Segmentation
  • B. CASB
  • C. HIPS
  • D. UEBA


Answer : A

Which of the following is the reason why security engineers often cannot upgrade the security of embedded facility automation systems?

  • A. They are constrained by available compute.
  • B. They lack x86-64 processors.
  • C. They lack EEPROM.
  • D. They are not logic-bearing devices.


Answer : A

A security analyst identified a vulnerable and deprecated runtime engine that Is supporting a public-facing banking application. The developers anticipate the transition to modern development environments will take at least a month. Which of the following controls would best mitigate the risk without interrupting the service during the transition?

  • A. Shutting down the systems until the code is ready
  • B. Uninstalling the impacted runtime engine
  • C. Selectively blocking traffic on the affected port
  • D. Configuring IPS and WAF with signatures


Answer : D

A security architect wants to ensure a remote host's identity and decides that pinning the X.509 certificate to the device is the most effective solution. Which of the following must happen first?

  • A. Use Distinguished Encoding Rules (DER) for the certificate.
  • B. Extract the private key from the certificate.
  • C. Use an out-of-band method to obtain the certificate.
  • D. Compare the retrieved certificate with the embedded certificate.


Answer : C

A company hired a third-party consultant to run a cybersecurity incident simulation in order to identify security gaps and prepare stakeholders for a potential incident. Which of the following best describes this activity?

  • A. Tabletop exercise
  • B. Walk-through review
  • C. Lessons learned
  • D. Business impact analysis


Answer : A

Page:    1 / 5   
Exam contains 74 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy