Q: 11
A security team is reviewing the findings in a report that was delivered after a third party performed
a penetration test. One of the findings indicated that a web application form field is vulnerable to
cross-site scripting. Which of the following application security techniques should the security
analyst recommend the developer implement to prevent this vulnerability?
Options
Discussion
C not A. Secure cookies are for session protection, but input validation directly prevents XSS. Pretty sure C is right.
Makes sense, this would be C. Saw a super similar question show up in some practice tests too.
Probably C here. XSS prevention is all about input validation, not code signing or cookies.
Be respectful. No spam.
Q: 12
SIMULATION
A security analyst is creating the first draft of a network diagram for the company's new customer-
facing payment application that will be hosted by a third-party cloud service
provider.


Your Answer
Discussion
This looks like a spot where you'd use a reverse proxy. It can sit between the clients and the web servers to help manage traffic and provide some basic protection. Not sure if that's enough for layer-7 threats though. Anyone see issues with that approach?
Be respectful. No spam.
Q: 13
Which of the following would most likely prevent exploitation of an end-of-life, business-critical
system?
Options
Discussion
If the requirement said "first step" instead of "most likely," would you still pick B or go for monitoring?
Be respectful. No spam.
Q: 14
A company recently decided to allow employees to work remotely. The company wants to protect us
data without using a VPN. Which of the following technologies should the company Implement?
Options
Discussion
Makes sense to use Secure web gateway here A. SWG lets remote staff access the web securely with policy controls, even if they’re not on VPN. I’ve seen similar advice in the official study guide. Correct me if I’m missing something.
A, since secure web gateways are built for protecting data when users are remote and not on VPN. Pretty sure that's what they're looking for.
Be respectful. No spam.
Q: 15
SIMULATION
A recent black-box penetration test of http://example.com discovered that external
website vulnerabilities exist, such as directory traversals, cross-site scripting, cross-site forgery, and
insecure protocols.
You are tasked with reducing the attack space and enabling secure protocols.
INSTRUCTIONS
Part 1
Use the drop-down menus to select the appropriate technologies for each location to implement a
secure and resilient web architecture. Not all technologies will be used, and technologies may be
used multiple times.
Part 2
Use the drop-down menus to select the appropriate command snippets from the drop-down menus.
Each command section must be filled.


Your Answer
Discussion
Router, firewall, WAF, web server order is what I’ve seen in official guides and practice labs for this scenario. For the command part, pretty sure rsa:2048 is correct in every field as listed. Check CompTIA objectives if you want to double check me.
Looks like firewall as the first box makes more sense, not router. I'd pick firewall at the perimeter, then WAF, then web server. For the commands, I think you need something like -keyout for one of the fields instead of rsa:2048 everywhere.
Be respectful. No spam.
Q: 16
A security team created a document that details the order in which critical systems should be
through back online after a major outage. Which of the following documents did the team create?
Options
Discussion
Its D
Be respectful. No spam.
Q: 17
Which of the following steps in the risk management process involves establishing the scope and
potential risks involved with a project?
Options
Discussion
B, seen similar question in practice sets. Risk identification is where you figure out what could go wrong for the project.
Be respectful. No spam.
Q: 18
A security administrator would like to protect data on employees’ laptops. Which of the following
encryption techniques should the security administrator use?
Options
Discussion
B tbh, official guide and exam reports mention asymmetric for data security a lot.
Be respectful. No spam.
Q: 19
A company makes a change during the appropriate change window, but the unsuccessful change
extends beyond the scheduled time and impacts customers. Which of the following would prevent
this from reoccurring?
Options
Discussion
C or D. Clear scenario, reminds me of similar exam wording.
Be respectful. No spam.
Q: 20
The management team notices that new accounts that are set up manually do not always have
correct access or permissions.
Which of the following automation techniques should a systems administrator use to streamline
account creation?
Options
Discussion
D imo. User provisioning script is what the official guide suggests for automation here.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2