CompTIA CertMaster CE for Security+ -
Domain 4.0 Security Operations
Assessment Exam Question And
Answers 2024
An organization needs to implement web filtering to bolster its
security. The goal is to ensure consistent policy enforcement for
both in-office and remote workers. Which of the following web
filtering methods BEST meets this requirement?
A. Utilizing a centralized proxy server
B. Deploying agent-based web filtering
C. Implementing manual URL blocking
D. Relying solely on reputation-based filtering - correct
answers✅B. Deploying agent-based web filtering
A software technician delivers a presentation on the capabilities
associated with centralizing web filtering. When exploring
techniques tied to centralized proxy service employment to
protect traffic, what classifies websites into various groupings,
such as social networking, webmail, or gambling sites?
A. Content categorization
B. URL scanning
C. Block rules
D. Reputation-based filtering - correct answers✅A. Content
categorization
,CompTIA CertMaster CE for Security+ -
Domain 4.0 Security Operations
Assessment Exam Question And
Answers 2024
A digital forensic analyst at a healthcare company investigates a
case involving a recent data breach. In evaluating the available
data sources to assist in the investigation, what application
protocol and event-logging format enables different appliances
and software applications to transmit logs or event records to a
central server?
A. Dashboard
B. Endpoint log
C. Application Log
D. Syslog - correct answers✅D. Syslog
A tech company is in the process of decommissioning a fleet of
old servers. It wants to ensure that sensitive data stored on these
servers is fully eliminated and is not accessible in the event of
unauthorized attempts. What primary process should the
company implement before disposing or repurposing these
servers?
A. Moving the servers to a secure storage location
B. Deleting all the files on the servers
C. Sanitizing the servers
,CompTIA CertMaster CE for Security+ -
Domain 4.0 Security Operations
Assessment Exam Question And
Answers 2024
D. Selling the servers immediately - correct answers✅C.
Sanitizing the servers
During the process of merging two companies, the integrated
security team is tasked with consolidating their approaches to
managing cybersecurity incidents. Which comprehensive
document should be developed to outline the overall strategy and
procedures for incident response, encompassing preparation,
identification, containment, eradication, recovery, communication
protocols, and contacts and resources for responders?
A. Playbook
B. Communication plan
C. Incident response plan
D. Incident response lifecycle - correct answers✅C. Incident
response plan
A forensic analyst at an international law enforcement agency
investigates a sophisticated cyber-espionage case. The analyst
must uncover the timeline of document interactions, detect
concealed or system-protected files, interpret categories of digital
events, and trace digital breadcrumbs left behind during media
uploads on social platforms. What combination of data sources
would provide the MOST comprehensive information for this
multifaceted investigation?
A. File metadata and event logs
B. Network transaction logs and gateway security logs
, CompTIA CertMaster CE for Security+ -
Domain 4.0 Security Operations
Assessment Exam Question And
Answers 2024
C. File metadata with extended attributes and network transaction
logs
D. Event logs and gateway security logs - correct answers✅C. File
metadata with extended attributes and network transaction logs
An organization has implemented a Bring Your Own Device (BYOD)
policy, allowing employees to use their personal mobile devices
for work-related tasks. Aware of the varying legal ramifications
and privacy concerns across different jurisdictions related to
controlling personal devices, the organization seeks to enhance
the security of these devices within the constraints of these legal
and privacy issues. Considering this context, which of the
following measures would be the MOST effective way to navigate
these complexities while striving to secure employees' mobile
devices under the BYOD policy?
A. Restricting all access to company resources from mobile
devices
B. Providing employees with company-owned mobile devices
C. Using MDM solutions to centrally control employees' mobile
devices
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Ammelia. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.29. You're not tied to anything after your purchase.