SY0-701 CertMaster CE Domain 4.0 QUIZ 2 2024: QUESTIONS AND ANSWERS ALL CORRECT
0 view 0 purchase
Course
Certmaster CE Security+ Domain 4.0
Institution
Certmaster CE Security+ Domain 4.0
SY0-701 CertMaster CE Domain 4.0 QUIZ 2 2024: QUESTIONS AND ANSWERS ALL CORRECT
SY0-701 CertMaster CE Domain 4.0 QUIZ 2 2024: QUESTIONS AND ANSWERS ALL CORRECT
SY0-701 CertMaster CE
Domain 4.0 QUIZ 2 2024:
QUESTIONS AND
A
ANSWERS ALL CORRECT
VI
TU
IS
M
Network security baselines - ANSWER The IT team of a medium-sized business is
planning to enhance network security. They want to enforce minimum security controls
O
and configurations across all network devices, including firewalls, routers, and switches.
What should they establish to achieve this objective?
A
Endpoint logs, log files generated by the OS components of the affected host computer,
and logs from the host-based intrusion detection system. - ANSWER A security
N
operations analyst at a financial institution analyzes an incident involving unauthorized
transactions. The analyst suspects that a malware infection on one of the endpoints
might have led to the unauthorized access. To identify the root cause and trace the
JP
activities of the suspected malware, which combination of data sources should the
analyst primarily consider?
Something you have - ANSWER After a breach, an organization implements new
multifactor authentication (MFA) protocols. What MFA philosophy incorporates using a
smart card or key fob to support authentication?
, Patching - ANSWER A cyber team is responding to regulatory requirements after
the organization falls victim to a breach. What remediation practice involves the
application of updates to systems to fix known vulnerabilities?
Agent-based filtering - ANSWER An organization wants to enhance its cybersecurity
by implementing web filtering. The company needs a solution that provides granular
control over web traffic, ensures policy enforcement even when employees are off the
corporate network, and can log and analyze Internet usage patterns. Which of the
following strategies BEST meets these requirements?
A
Can lead to delays in remediation, Increase window of opportunity for attackers -
VI
ANSWER An IT admin has been testing a newly released software patch and
discovered an exploitable vulnerability. The manager directs the IT admin to
immediately report to Common Vulnerability and Exposures (CVE), utilizing the
TU
Common Vulnerability Scoring System (CVSS) to base the score for the vulnerability.
What could happen if there are delays in completing the report? (Select the two best
options.)
IS
DKIM - ANSWER A cyber technician is enhancing application security capabilities
for corporate email accounts following a breach. Which of the following options
leverages encryption features to enable email verification by allowing the sender to sign
emails using a digital signature?
M
Provisioning and de-provisioning of user accounts involve creating, modifying, and
O
removing user accounts to maintain appropriate access levels. The principle of least
privilege guides the assignment of permissions, ensuring users have only the necessary
access for their job roles. - ANSWER At a large company, the IT department
A
manages user accounts and permissions for the organization's various systems. The IT
team employs a well-structured provisioning and de-provisioning process to create,
N
modify, and remove user accounts and assign permissions to minimize potential
security risks. Which statements related to user account provisioning and permission
assignments are correct? (Select the two best options.)
JP
Automatically update the vulnerability scanner's database via a vulnerability feed
Integrate the scanner with the Security Content Automation Protocol (SCAP)
Adjust the environmental variables within the vulnerability management system -
ANSWER A new system administrator has been spending the morning manually
entering new vulnerability signatures based on Common Vulnerabilities and Exposures
(CVE) data and using the Common Vulnerability Scoring System (CVSS) for
remediation guidance. To enhance efficiency and ensure the vulnerability scanner
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller JPNAOMISTUVIA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.