A security engineer implements multiple technical

This preview shows page 19 - 21 out of 25 pages.

61.A security engineer implements multiple technical measures to secure anenterprise network. The engineer also works with the Chief information Officer (CID)to implement policies to govern user behavior.Which of the following strategies is the security engineer executing? A. Base liningB. Mandatory access controlC. Control diversityD. System hardeningAnswer: A 62.An organization's Chief Executive Officer (CEO) directs a newly hired computertechnician to install an OS on the CEO‘s: personal laptop. The technician performsthe installation, and a software audit later in the month indicates a violation of theEULA occurred as a result.Which of the following would address this violation going forward? 63.A security analyst is reviewing the password policy for a service account that isused for a critical network service.The password policy for this account is as follows:Enforce password history: Three passwords rememberedMaximum password age: 30 daysMinimum password age: Zero daysComplexity requirements: At least one special character, one uppercaseMinimum password length: Seven charactersLockout duration: One dayLockout threshold: Five failed attempts in 15 minutesWhich of the following adjustments would be the MOST appropriate for the serviceaccount? 19 / 25
CompTIA Security+ SY0-501 Dumps V24.02 DumpsBaseAfter removing the hard drive from the desktop and running an offline file integritycheck, the technician reviews the following output:Based on the above output, which of the following is the malicious file? 64.A law office has been leasing dark fiber from a local telecommunications companyto connect a remote office to company headquarters. The telecommunicationcompany has decided to discontinue its dark fiber product and is offering an MPLSconnection.Which the law office feels is too expensive.Which of the following is the BEST solution for the law office? 65.A technician suspects that a desktop was compromised with a rootkit.After removing the hard drive from the desktop and running an offline file integritycheck, the technician reviews the following output:Based on the above output, which of the following is the malicious file? A. notepad.exeB. lsass.exeC. kernel.dllD. httpd.axeAnswer: C

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture