SY0-601試験無料問題集「CompTIA Security+ 認定」

A security consultant needs secure, remote access to a client environment. Which of the following should the security consultant most likely use to gain access?

one of the attendees starts to notice delays in the connection. and the HTTPS site requests are reverting to HTTP. Which of the following BEST describes what is happening?

解説: (GoShiken メンバーにのみ表示されます)
Audit logs indicate an administrative account that belongs to a security engineer has been locked out multiple times during the day. The security engineer has been on vacation (or a few days. Which of the following attacks can the account lockout be attributed to?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following involves the inclusion of code in the main codebase as soon as it is written?

解説: (GoShiken メンバーにのみ表示されます)
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Select two).

A local business When of the following best describes a legal hold?

Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

解説: (GoShiken メンバーにのみ表示されます)
The compliance team requires an annual recertification of privileged and non-privileged user access. However, multiple users who left the company six months ago still have access. Which of the following would have prevented this compliance violation?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

Which of the following incident response steps occurs before containment?

解説: (GoShiken メンバーにのみ表示されます)
After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:

解説: (GoShiken メンバーにのみ表示されます)
During an incident, an EDR system detects an increase in the number of encrypted outbound connections from multiple hosts. A firewall is also reporting an increase in outbound connections that use random high ports. An analyst plans to review the correlated logs to find the source of the incident. Which of the following tools will best assist the analyst?

解説: (GoShiken メンバーにのみ表示されます)