View Mode
Q: 1
[Governance, Risk, and Compliance (GRC)] A security engineer is assisting a DevOps team that has the following requirements for container images: Ensure container images are hashed and use version controls. Ensure container images are up to date and scanned for vulnerabilities. Which of the following should the security engineer do to meet these requirements?
Options
Q: 2
[Governance, Risk, and Compliance (GRC)] An audit finding reveals that a legacy platform has not retained loos for more than 30 days The platform has been segmented due to its interoperability with newer technology. As a temporarysolution, the IT department changed the log retention to 120 days. Which of the following should the security engineer do to ensure the logs are being properly retained?
Options
Q: 3
[Security Architecture] A developer makes a small change to a resource allocation module on a popular social media website and causes a memory leak. During a peak utilization period, several web servers crash, causing the website to go offline. Which of the following testing techniques is the most efficient way to prevent this from reoccurring?
Options
Q: 4
[Emerging Technologies and Threats] Which of the following best explains the business requirement a healthcare provider fulfills by encrypting patient data at rest?
Options
Q: 5
[Emerging Technologies and Threats] A security engineer wants to reduce the attack surface of a public-facing containerized application Which of the following will best reduce the application's privilege escalation attack surface?
Options
Q: 6
[Governance, Risk, and Compliance (GRC)] A compliance officer isfacilitating abusiness impact analysis (BIA)and wantsbusiness unit leadersto collect meaningful dat a. Several business unit leaders want more information about the types of data the officer needs. Which of the following data types would be the most beneficial for the compliance officer?(Select two)
Options
Q: 7
[Security Architecture] A senior security engineer flags the following log file snippet as having likely facilitated an attacker’s lateral movement in a recent breach: qry_source: 19.27.214.22 TCP/53 qry_dest: 199.105.22.13 TCP/53 qry_type: AXFR | in comptia.org ------------ directoryserver1 A 10.80.8.10 ------------directoryserver2 A 10.80.8.11 ------------ directoryserver3 A 10.80.8.12 ------------ internal-dns A 10.80.9.1 ----------- www-int A 10.80.9.3 ------------ fshare A 10.80.9.4 ------------ sip A 10.80.9.5 ------------ msn-crit-apcs A 10.81.22.33 Which of the following solutions, if implemented, would mitigate the risk of this issue reoccurring?
Options
Q: 8
[Security Assessments and Testing] During a vulnerability assessment, a scan reveals the following finding: Windows Server 2016 Missing hotfix KB87728 - CVSS 3.1 Score: 8.1 [High] - Affected host 172.16.15.2 Later in the review process, the remediation team marks the finding as a false positive. Which of the following is the best way toavoid this issue on future scans?
Options
Q: 9
[Security Architecture] Which of the following supports the process of collecting a large pool of behavioral observations to inform decision-making?
Options
Q: 10
[Security Operations] An organization found a significant vulnerability associated with a commonly used package in a variety of operating systems. The organization develops a registry of software dependencies to facilitate incident response activities. As part of the registry, the organization creates hashes of packages that have been formally vetted. Which of the following attack vectors does this registry address?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE