SY0-601試験無料問題集「CompTIA Security+ 認定」

A security team is conducting a review of the company's SaaS and PaaS security postures. Which of the following is the best source of secure architecture guidance for these environments?

A company is experiencing a web services outage on the public network. The services are up and available but inaccessible. The network logs show a sudden increase in network traffic that is causing the outage. Which of the following attacks is the organization experiencing?

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?

Which of the following describes business units that purchase and implement scripting software without approval from an organization's technology Support staff?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following, if compromised, can indirectly impact systems' availability by imposing inadequate environmental conditions for the hardware to operate properly?

Cloud security engineers are planning to allow and deny access to specific features in order to in-crease data security. Which of the following cloud features is the most appropriate to ensure ac-cess is granted properly?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following disaster recovery tests is the LEAST time consuming for the disaster recovery team?

解説: (GoShiken メンバーにのみ表示されます)
A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to Implement mitigation techniques to prevent further spread. Which of the following is the best course of action for the analyst to take?

解説: (GoShiken メンバーにのみ表示されます)
A malicious actor recently penetrated a company's network and moved laterally to the data center Upon investigation a forensics firm wants to know what was in the memory on the compromised server Which of the following files should be given to the forensics firm?

解説: (GoShiken メンバーにのみ表示されます)
After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?

解説: (GoShiken メンバーにのみ表示されます)
An organization is concerned about hackers bypassing MFA through social engineering of phone carriers. Which of the following would most likely protect against such an attack?

A security team is engaging a third-party vendor to do a penetration test of a new proprietary application prior to its release. Which of the following documents would the third-party vendor most likely be required to review and sign?

解説: (GoShiken メンバーにのみ表示されます)