




Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Comptia 251-300 Questions and correct Answers,.Comptia 251-300 Questions and correct Answers,.Comptia 251-300 Questions and correct Answers,.
Typology: Exams
1 / 8
This page cannot be seen from the preview
Don't miss anything!
Which of the following environments utilizes dummy data and is MOST likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build? D. Development 3 multiple choice options An analyst receives multiple alerts for beaconing activity for a host on the network. After analyzing the activity, the analyst observes the following activity: -A user enters comptia.org into a web browser. -The website that appears is not the comptia.org site. -The website is a malicious site from the attacker. -Users in a different office are not having this issue. Which of the following types of attacks was observed? B. DNS poisoning 3 multiple choice options Which of the following in the incident response process is the BEST approach to improve the speed of the identification phase? B. Tune monitoring in order to reduce false positive rates. 3 multiple choice options A security administrator is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airodump-ng, the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of the legitimate access points. Which of the following attacks is happening on the corporate network? B. Evil twin 3 multiple choice options When implementing automation with IoT devices, which of the following should be considered FIRST to keep the network secure? D. Communication protocols 3 multiple choice options An organization is concerned that its hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities? C. nmap comptia.org -p 80 -sV 3 multiple choice options A news article states hackers have been selling access to IoT camera feeds. Which of the following is the MOST likely reason for this issue? B. Weak credentials
3 multiple choice options A company wants to build a new website to sell products online. The website will host a storefront application that will allow visitors to add products to a shopping cart and pay for the products using a credit card. Which of the following protocols would be the MOST secure to implement? D. TLS 3 multiple choice options An IT manager is estimating the mobile device budget for the upcoming year. Over the last five years, the number of devices that were replaced due to loss, damage, or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced next year? B. ARO 3 multiple choice options An organization is repairing the damage after an incident. Which of the following controls is being implemented? C. Corrective 3 multiple choice options A Chief Executive Officer's (CEO) personal information was stolen in a social- engineering attack. Which of the following sources would reveal if the CEO's personal information is for sale? C. The dark web 3 multiple choice options Which of the following typically uses a combination of human and artificial intelligence to analyze event data and take action without intervention? C. SOAR 3 multiple choice options A security analyst has been tasked with creating a new WiFi network for the company. The requirements received by the analyst are as follows: -Must be able to differentiate between users connected to WiFi -The encryption keys need to change routinely without interrupting the users or forcing reauthentication -Must be able to integrate with RADIUS -Must not have any open SSIDs Which of the following options BEST accommodates these requirements? A. WPA2-Enterprise 3 multiple choice options A security administrator is trying to determine whether a server is vulnerable to a range of attacks. After using a tool, the administrator obtains the following output: Which of the following attacks was successfully implemented based on the output? D. Directory traversal
The database administration team is requesting guidance for a secure solution that will ensure confidentiality of cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs. Which of the following is the BEST solution to meet the requirement? A. Tokenization 3 multiple choice options A company's security team received notice of a critical vulnerability affecting a high- profile device within the web infrastructure. The vendor patch was just made available online but has not yet been regression tested in development environments. In the interim, firewall rules were implemented to reduce the access to the interface affected by the vulnerability. Which of the following controls does this scenario describe? B. Compensating 3 multiple choice options A security analyst is reviewing the following command-line output: Which of the following is the analyst observing? C. MAC address cloning 3 multiple choice options A company was recently breached, Part of the company's new cybersecurity strategy is to centralize the logs from all security devices. Which of the following components forwards the logs to a central source? D. Log collector 3 multiple choice options Which of the following is the MOST likely reason for securing an air-gapped laboratory HVAC system? C. To ensure availability 3 multiple choice options A user forwarded a suspicious email to the security team. Upon investigation, a malicious URL was discovered. Which of the following should be done FIRST to prevent other users from accessing the malicious URL? A. Configure the web content filter for the web address. 3 multiple choice options A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Choose two.) C. The provenance of the artifacts E. The date and time 3 multiple choice options
An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following application integration aspects should the organization consider before focusing into underlying implementation details? (Choose two.) A. The back-end directory source B. The identity federation protocol 3 multiple choice options A security analyst has been tasked with finding the maximum amount of data loss that can occur before ongoing business operations would be impacted. Which of the following terms BEST defines this metric? C. RPO 3 multiple choice options During a security incident investigation, an analyst consults the company's SIEM and sees an event concerning high traffic to a known, malicious command-and-control server. The analyst would like to determine the number of company workstations that may be impacted by this issue. Which of the following can provide this information? B. DNS logs 3 multiple choice options The IT department's on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production? D. Submit the application to QA before releasing it. 3 multiple choice options A company has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements? B. VPC 3 multiple choice options A new plug-and-play storage device was installed on a PC in the corporate environment. Which of the following safeguards will BEST help to protect the PC from malicious files on the storage device? A. Change the default settings on the PC 3 multiple choice options A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy? A. Mobile device management 3 multiple choice options A company wants to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategy to implement? E. Full backups followed by differential backups 3 multiple choice options The compliance team requires an annual recertification of privileged and non-privileged user access. However, multiple users who left the company six months ago still have access. Which of the following would have prevented this compliance violation?
The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, including during a pandemic or crisis. However, the CEO is concerned that some staff members may take advantage of the flexibility and work from high-risk countries while on holiday or outsource work to a third-party organization in another country. The Chief Information Officer (CIO) believes the company can implement some basic controls to mitigate the majority of the risk. Which of the following would be BEST to mitigate the CEO's concerns? (Choose two.) A. Geolocation B. Time-of-day restrictions 3 multiple choice options While checking logs, a security engineer notices a number of end users suddenly downloading files with the .tar.gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on an external email containing an infected MHT file with an href link a week prior. Which of the following is MOST likely occurring? A. A RAT was installed and is transferring additional exploit tools. 3 multiple choice options A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service provider types should the business engage? C. XaaS 3 multiple choice options A research company discovered that an unauthorized piece of software has been detected on a small number of machines in its lab. The researchers collaborate with other machines using port 445 and on the Internet using port 443. The unauthorized software is starting to be seen on additional machines outside of the lab and is making outbound communications using HTTPS and SMB. The security team has been instructed to resolve the problem as quickly as possible while causing minimal disruption to the researchers. Which of the following contains the BEST course of action in this scenario? C. Place the unauthorized application in a blocklist. 3 multiple choice options A security analyst has been reading about a newly discovered cyberattack from a known threat actor. Which of the following would BEST support the analyst's review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns? B. The MITRE ATT&CK framework 3 multiple choice options A security analyst is hardening a network infrastructure. The analyst is given the following requirements: -Preserve the use of public IP addresses assigned to equipment on the core router. -Enable "in transport" encryption protection to the web server with the strongest ciphers.
Which of the following should the analyst implement to meet these requirements? (Choose two.) B. Configure NAT on the core router. F. Enable TLSv2 encryption on the web server. 3 multiple choice options