CompTIA Security+ 2023 v1.0

Page:    1 / 31   
Exam contains 457 questions

A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

  • A. Open-source intelligence
  • B. Bug bounty
  • C. Red team
  • D. Penetration testing


Answer : B

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

  • A. Insider
  • B. Unskilled attacker
  • C. Nation-state
  • D. Hacktivist


Answer : C

Which of the following enables the use of an input field to run commands that can view or manipulate data?

  • A. Cross-site scripting
  • B. Side loading
  • C. Buffer overflow
  • D. SQL injection


Answer : D

Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

  • A. Encrypted
  • B. Intellectual property
  • C. Critical
  • D. Data in transit


Answer : B

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

  • A. If a security incident occurs on the device, the correct employee can be notified.
  • B. The security team will be able to send user awareness training to the appropriate device.
  • C. Users can be mapped to their devices when configuring software MFA tokens.
  • D. User-based firewall policies can be correctly targeted to the appropriate laptops.
  • E. When conducting penetration testing, the security team will be able to target the desired laptops.
  • F. Company data can be accounted for when the employee leaves the organization.


Answer : AF

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?

  • A. Send out periodic security reminders.
  • B. Update the content of new hire documentation.
  • C. Modify the content of recurring training.
  • D. Implement a phishing campaign.


Answer : C

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

  • A. Packet captures
  • B. Vulnerability scans
  • C. Metadata
  • D. Dashboard


Answer : D

A systems administrator receives the following alert from a file integrity monitoring tool:
The hash of the cmd.exe file has changed.
The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?

  • A. The end user changed the file permissions.
  • B. A cryptographic collision was detected.
  • C. A snapshot of the file system was taken.
  • D. A rootkit was deployed.


Answer : D

Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

  • A. Client
  • B. Third-party vendor
  • C. Cloud provider
  • D. DBA


Answer : A

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?

  • A. MSA
  • B. SLA
  • C. BPA
  • D. SOW


Answer : D

A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?

  • A. Secure cookies
  • B. Version control
  • C. Input validation
  • D. Code signing


Answer : C

Which of the following must be considered when designing a high-availability network? (Choose two).

  • A. Ease of recovery
  • B. Ability to patch
  • C. Physical isolation
  • D. Responsiveness
  • E. Attack surface
  • F. Extensible authentication


Answer : AD

A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?

  • A. Air gap the system.
  • B. Move the system to a different network segment.
  • C. Create a change control request.
  • D. Apply the patch to the system.


Answer : C

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

  • A. To gather IoCs for the investigation
  • B. To discover which systems have been affected
  • C. To eradicate any trace of malware on the network
  • D. To prevent future incidents of the same nature


Answer : D

Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?

  • A. Fines
  • B. Audit findings
  • C. Sanctions
  • D. Reputation damage


Answer : B

Page:    1 / 31   
Exam contains 457 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy