Free SY0-701 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 23 of 0
QUESTION 106

- (Exam Topic 2)
Given the following snippet of Python code:
Which of the following types of malware MOST likely contains this snippet?
SY0-701 dumps exhibit

  1. A. Logic bomb
  2. B. Keylogger
  3. C. Backdoor
  4. D. Ransomware

Correct Answer: A
A logic bomb is a type of malware that executes malicious code when certain conditions are met. A logic bomb can be triggered by various events, such as a specific date or time, a user action, a system configuration change, or a command from an attacker. A logic bomb can perform various malicious actions, such as deleting files, encrypting data, displaying messages, or launching other malware.
The snippet of Python code shows a logic bomb that executes a function called delete_all_files() when the current date is December 25th. The code uses the datetime module to get the current date and compare it with a predefined date object. If the condition is true, the code calls the delete_all_files() function, which presumably deletes all files on the system.
References: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.kaspersky.com/resource-center/definitions/logic-bomb

QUESTION 107

- (Exam Topic 2)
Audit logs indicate an administrative account that belongs to a security engineer has been locked out multiple times during the day. The security engineer has been on vacation (or a few days. Which of the following attacks can the account lockout be attributed to?

  1. A. Backdoor
  2. B. Brute-force
  3. C. Rootkit
  4. D. Trojan

Correct Answer: B
The account lockout can be attributed to a brute-force attack. A brute-force attack is a type of attack where an attacker attempts to guess a user's password by continually trying different combinations of characters. In this case, it is likely that the security engineer's account was locked out due to an attacker attempting to guess their password. Backdoor, rootkit, and Trojan attacks are not relevant in this scenario.

QUESTION 108

- (Exam Topic 2)
A security administrator is using UDP port 514 to send a syslog through an unsecure network to the SIEM server. Which of the following is the best way for the administrator to improve the process?

  1. A. Change the protocol to TCP.
  2. B. Add LDAP authentication to the SIEM server.
  3. C. Use a VPN from the internal server to the SIEM and enable DLP.
  4. D. Add SSL/TLS encryption and use a TCP 6514 port to send logs.

Correct Answer: D
SSL/TLS encryption is a method of securing the syslog traffic by using cryptographic protocols to encrypt and authenticate the data. SSL/TLS encryption can prevent eavesdropping, tampering, or spoofing of the syslog messages. TCP 6514 is the standard port for syslog over TLS, as defined by RFC 5425. Using this port can ensure compatibility and interoperability with other syslog implementations that support TLS.

QUESTION 109

- (Exam Topic 1)
Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?

  1. A. GDPR
  2. B. PCI DSS
  3. C. ISO 27000
  4. D. NIST 800-53

Correct Answer: D
NIST 800-53 provides a catalog of security and privacy controls related to the United States federal information systems. References: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 3: Architecture and Design, pp. 123-125

QUESTION 110

- (Exam Topic 1)
A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the company to require from prospective vendors?

  1. A. IP restrictions
  2. B. Multifactor authentication
  3. C. A banned password list
  4. D. A complex password policy

Correct Answer: B
Multifactor authentication (MFA) would be the best control to require from a third-party identity provider to help mitigate attacks such as credential theft and brute-force attacks. References: CompTIA Security+ Study Guide, Exam SY0-601, Chapter 2

Page 23 of 0

Post your Comments and Discuss CompTIA SY0-701 exam with other Community members: