Free SY0-701 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 11 of 0
QUESTION 46

- (Exam Topic 1)
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)

  1. A. Block cipher
  2. B. Hashing
  3. C. Private key
  4. D. Perfect forward secrecy
  5. E. Salting
  6. F. Symmetric keys

Correct Answer: BC
Non-repudiation is the ability to ensure that a party cannot deny a previous action or event. Cryptographic concepts that can be used to implement non-repudiation include hashing and digital signatures, which use a private key to sign a message and ensure that the signature is unique to the signer. References: CompTIA Security+ Certification Exam Objectives (SY0-601)

QUESTION 47

- (Exam Topic 2)
A security analyst needs to implement security features across smartphones. laptops, and tablets. Which of the following would be the most effective across heterogeneous platforms?

  1. A. Enforcing encryption
  2. B. Deploying GPOs
  3. C. Removing administrative permissions
  4. D. Applying MDM software

Correct Answer: D
MDM stands for Mobile Device Management, which is a software solution that can manage and secure smartphones, laptops, tablets and other mobile devices across heterogeneous platforms. MDM can enforce security features such as encryption, password policies, remote wipe, device tracking, app control and more. MDM can also monitor and update the devices remotely and provide reports and alerts on their status. MDM is the most effective solution to implement security features across heterogeneous platforms, as it can provide centralized and consistent management of various types of devices. Verified References:
SY0-701 dumps exhibit Security+ (Plus) Certification | CompTIA IT Certifications
https://www.comptia.org/certifications/security (See Domain 3: Architecture and Design, Objective 3.4: Given a scenario, implement secure systems design.)
SY0-701 dumps exhibit CompTIA Security+ 601 - Infosec
https://www.infosecinstitute.com/wp-content/uploads/2021/03/CompTIA-Security-eBook.pdf (See Security+: 5 in-demand cybersecurity skills, Implementation)
SY0-701 dumps exhibit Certification Security+ | CompTIA https://www.comptia.org/landing/securityplus/index.html (See Exam Objectives)

QUESTION 48

- (Exam Topic 1)
A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business Which of the following constraints BEST describes the reason the findings cannot be remediated?

  1. A. inability to authenticate
  2. B. Implied trust
  3. C. Lack of computing power
  4. D. Unavailable patch

Correct Answer: D
If the systems are running unsecure protocols and the company that developed them is no longer in business, it is likely that there are no patches available to remediate the issue. References:
SY0-701 dumps exhibitCompTIA Security+ Study Guide, Sixth Edition, pages 35-36

QUESTION 49

- (Exam Topic 1)
A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?

  1. A. Implementation of preventive controls
  2. B. Implementation of detective controls
  3. C. Implementation of deterrent controls
  4. D. Implementation of corrective controls

Correct Answer: B
A Security Information and Event Management (SIEM) system is a tool that collects and analyzes
security-related data from various sources to detect and respond to security incidents. References: CompTIA Security+ Study Guide 601, Chapter 5

QUESTION 50

- (Exam Topic 2)
During a recent cybersecurity audit, the auditors pointed out various types of vulnerabilities in the production area. The production area hardware runs applications that are critical to production Which of the following describes what the company should do first to lower the risk to the
Production the hardware.

  1. A. Back up the hardware.
  2. B. Apply patches.
  3. C. Install an antivirus solution.
  4. D. Add a banner page to the hardware.

Correct Answer: B
Applying patches is the first step to lower the risk to the production hardware, as patches are updates that fix vulnerabilities or bugs in the software or firmware. Patches can prevent attackers from exploiting known vulnerabilities and compromising the production hardware. Applying patches should be done regularly and in a timely manner, following a patch management policy and process. References: 1
CompTIA Security+
Certification Exam Objectives, page 9, Domain 2.0: Architecture and Design, Objective 2.3: Summarize
secure application development, deployment, and automation concepts 2
CompTIA Security+ Certification
Exam Objectives, page 10, Domain 2.0: Architecture and Design, Objective 2.4: Explain the importance of
embedded and specialized systems security 3 https://www.comptia.org/blog/patch-management-best-practices

Page 11 of 0

Post your Comments and Discuss CompTIA SY0-701 exam with other Community members: