View Mode
Q: 11
A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?
Options
Q: 12
SIMULATION A security analyst is creating the first draft of a network diagram for the company's new customer- facing payment application that will be hosted by a third-party cloud service provider. CompTIA Security + SY0-701 Dumps question CompTIA Security + SY0-701 Dumps question
Your Answer
Q: 13
Which of the following would most likely prevent exploitation of an end-of-life, business-critical system?
Options
Q: 14
A company recently decided to allow employees to work remotely. The company wants to protect us data without using a VPN. Which of the following technologies should the company Implement?
Options
Q: 15
SIMULATION A recent black-box penetration test of http://example.com discovered that external website vulnerabilities exist, such as directory traversals, cross-site scripting, cross-site forgery, and insecure protocols. You are tasked with reducing the attack space and enabling secure protocols. INSTRUCTIONS Part 1 Use the drop-down menus to select the appropriate technologies for each location to implement a secure and resilient web architecture. Not all technologies will be used, and technologies may be used multiple times. Part 2 Use the drop-down menus to select the appropriate command snippets from the drop-down menus. Each command section must be filled. CompTIA Security + SY0-701 Dumps question CompTIA Security + SY0-701 Dumps question CompTIA Security + SY0-701 Dumps question CompTIA Security + SY0-701 Dumps question
Your Answer
Q: 16
A security team created a document that details the order in which critical systems should be through back online after a major outage. Which of the following documents did the team create?
Options
Q: 17
Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?
Options
Q: 18
A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?
Options
Q: 19
A company makes a change during the appropriate change window, but the unsuccessful change extends beyond the scheduled time and impacts customers. Which of the following would prevent this from reoccurring?
Options
Q: 20
The management team notices that new accounts that are set up manually do not always have correct access or permissions. Which of the following automation techniques should a systems administrator use to streamline account creation?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE