SY0-701試験無料問題集「CompTIA Security+ Certification 認定」

After reviewing the following vulnerability scanning report:
Server:192.168.14.6
Service: Telnet
Port: 23 Protocol: TCP
Status: Open Severity: High
Vulnerability: Use of an insecure network protocol
A security analyst performs the following test:
nmap -p 23 192.168.14.6 -script telnet-encryption
PORT STATE SERVICE REASON
23/tcp open telnet syn-ack
I telnet encryption:
| _ Telnet server supports encryption
Which of the following would the security analyst conclude for this reported vulnerability?

解説: (GoShiken メンバーにのみ表示されます)
A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system.
Which of the following would detect this behavior?

解説: (GoShiken メンバーにのみ表示されます)
An administrator discovers that some files on a database server were recently encrypted. The administrator sees from the security logs that the data was last accessed by a domain user. Which of the following best describes the type of attack that occurred?

解説: (GoShiken メンバーにのみ表示されます)
A vendor salesperson is a personal friend of a company's Chief Financial Officer (CFO). The company recently made a large purchase from the vendor, which was directly approved by the CFO. Which of the following best describes this situation?

解説: (GoShiken メンバーにのみ表示されます)
An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?

解説: (GoShiken メンバーにのみ表示されます)
A software developer would like to ensure. The source code cannot be reverse engineered or debugged.
Which of the following should the developer consider?

解説: (GoShiken メンバーにのみ表示されます)
An employee in the accounting department receives an email containing a demand for payment tot services performed by a vendor However, the vendor is not in the vendor management database. Which of the following in this scenario an example of?

解説: (GoShiken メンバーにのみ表示されます)
A company is discarding a classified storage array and hires an outside vendor to complete the disposal.
Which of the following should the company request from the vendor?

解説: (GoShiken メンバーにのみ表示されます)
A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline Which of the following should the analyst use?

A security practitioner completes a vulnerability assessment on a company's network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?

解説: (GoShiken メンバーにのみ表示されます)
Employees located off-site must have access to company resources in order to complete their assigned tasks These employees utilize a solution that allows remote access without interception concerns. Which of the following best describes this solution?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following control types is AUP an example of?

解説: (GoShiken メンバーにのみ表示されます)
A company discovered its data was advertised for sale on the dark web. During the initial investigation, the company determined the data was proprietary data. Which of the following is the next step the company should take?

Which of the following provides the details about the terms of a test with a third-party penetration tester?

解説: (GoShiken メンバーにのみ表示されます)
An attorney prints confidential documents to a copier in an office space near multiple workstations and a reception desk. When the attorney goes to the copier to retrieve the documents, the documents are missing.
Which of the following would best prevent this from reoccurring?

解説: (GoShiken メンバーにのみ表示されます)
A database administrator is updating the company's SQL database, which stores credit card information for pending purchases. Which of the following is the best method to secure the data against a potential breach?