Practice Free SY0-701 Exam Online Questions
Question #151
While a user reviews their email, a host gets infected by malware from an external hard drive plugged into the host. The malware steals all the user’s credentials stored in the browser.
Which of the following training topics should the user review to prevent this situation from reoccurring?
- A . Operational security
- B . Removable media and cables
- C . Password management
- D . Social engineering
Correct Answer: B
B
Explanation:
Detailed This scenario highlights the need for training on the secure use of removable media. Users should learn to avoid using untrusted external storage devices to prevent malware infections.
Reference: CompTIA Security+ SY0-701 Study Guide, Domain 4: Security Operations, Section: "Removable Media Controls and User Awareness Training".
B
Explanation:
Detailed This scenario highlights the need for training on the secure use of removable media. Users should learn to avoid using untrusted external storage devices to prevent malware infections.
Reference: CompTIA Security+ SY0-701 Study Guide, Domain 4: Security Operations, Section: "Removable Media Controls and User Awareness Training".
Question #152
A security analyst receives an alert from a corporate endpoint used by employees to issue visitor badges. The alert contains the following details:
Which of the following best describes the indicator that triggered the alert?
- A . Blocked content
- B . Brute-force attack
- C . Concurrent session usage
- D . Account lockout
Correct Answer: B
B
Explanation:
Detailed The activity described in the table, where multiple connection attempts are made on port 445 (used for SMB services), suggests a brute-force attack. The attacker likely used automated methods to guess credentials, causing multiple failures. Such attempts are a hallmark of brute-force attacks targeting shared resources.
Reference: CompTIA Security+ SY0-701 Study Guide, Domain 4: Security Operations, Section: "Indicators of Malicious Activity".
B
Explanation:
Detailed The activity described in the table, where multiple connection attempts are made on port 445 (used for SMB services), suggests a brute-force attack. The attacker likely used automated methods to guess credentials, causing multiple failures. Such attempts are a hallmark of brute-force attacks targeting shared resources.
Reference: CompTIA Security+ SY0-701 Study Guide, Domain 4: Security Operations, Section: "Indicators of Malicious Activity".
Question #153
Which of the following cryptographic solutions protects data at rest?
- A . Digital signatures
- B . Full disk encryption
- C . Private key
- D . Steganography
Correct Answer: B