Free SY0-701 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 28 of 0
QUESTION 131

- (Exam Topic 1)
After a hardware incident, an unplanned emergency maintenance activity was conducted to rectify the issue. Multiple alerts were generated on the SIEM during this period of time. Which of the following BEST explains what happened?

  1. A. The unexpected traffic correlated against multiple rules, generating multiple alerts.
  2. B. Multiple alerts were generated due to an attack occurring at the same time.
  3. C. An error in the correlation rules triggered multiple alerts.
  4. D. The SIEM was unable to correlate the rules, triggering the alert

Correct Answer: A
Multiple alerts were generated on the SIEM during the emergency maintenance activity due to unexpected traffic correlated against multiple rules. The SIEM generates alerts when it detects an event that matches a rule in its rulebase. If the event matches multiple rules, the SIEM will generate multiple alerts.
Reference: CompTIA Security+ Study Guide, Exam SY0-601, Chapter 3: Architecture and Design

QUESTION 132

- (Exam Topic 2)
A security analyst receives an alert that indicates a user's device is displaying anomalous behavior The analyst suspects the device might be compromised Which of the following should the analyst to first?

  1. A. Reboot the device
  2. B. Set the host-based firewall to deny an incoming connection
  3. C. Update the antivirus definitions on the device
  4. D. Isolate the device

Correct Answer: D
Isolating the device is the first thing that a security analyst should do if they suspect that a user’s device might be compromised. Isolating the device means disconnecting it from the network or placing it in a separate network segment to prevent further communication with potential attackers or malicious hosts. Isolating the device can help contain the incident, limit the damage or data loss, preserve the evidence, and facilitate the investigation and remediation.
References: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://resources.infosecinstitute.com/topic/incident-response-process/

QUESTION 133

- (Exam Topic 2)
A user downloaded an extension for a browser, and the user's device later became infected. The analyst who Is Investigating the Incident saw various logs where the attacker was hiding activity by deleting data. The following was observed running:
New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -Driveletter C - FileSystemLabel "New"-FileSystem NTFS - Full -Force -Confirm:$false
Which of the following is the malware using to execute the attack?

  1. A. PowerShell
  2. B. Python
  3. C. Bash
  4. D. Macros

Correct Answer: A
PowerShell is a scripting language and command-line shell that can be used to automate tasks and manage systems. PowerShell can also be used by malware to execute malicious commands and evade detection. The code snippet in the question is a PowerShell command that creates a new partition on disk 2, formats it with NTFS file system, and assigns it a drive letter C. This could be part of an attack that wipes out the original data on the disk or creates a hidden partition for storing malware or stolen data. References:
SY0-701 dumps exhibit https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/scripting-and-automation/
SY0-701 dumps exhibit https://learn.microsoft.com/en-us/powershell/module/storage/new-partition?view=windowsserver2022-ps

QUESTION 134

- (Exam Topic 1)
Which of the following biometric authentication methods is the MOST accurate?

  1. A. Gait
  2. B. Retina
  3. C. Signature
  4. D. Voice

Correct Answer: B
Retina authentication is the most accurate biometric authentication method. Retina authentication is based on recognizing the unique pattern of blood vessels and other features in the retina. This makes it virtually impossible to duplicate or bypass, making it the most secure form of biometric authentication currently available.

QUESTION 135

- (Exam Topic 1)
A security administrator is working on a solution to protect passwords stored in a database against rainbow table attacks Which of the following should the administrator consider?

  1. A. Hashing
  2. B. Salting
  3. C. Lightweight cryptography
  4. D. Steganography

Correct Answer: B
Salting is a technique that adds random data to a password before hashing it. This makes the hash output more unique and unpredictable, and prevents attackers from using precomputed tables (such as rainbow tables) to crack the password hash. Salting also reduces the risk of collisions, which occur when different passwords produce the same hash.
References: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/

Page 28 of 0

Post your Comments and Discuss CompTIA SY0-701 exam with other Community members: