SYO-501 無料問題集「CompTIA Security+ Certification」
An administrator performs a workstation audit and finds one that has non-standard software installed. The administrator then requests a report to see if a change request was completed for the installed software. The report shows a request was completed. Which of the following has the administrator found?
正解:B
解答を投票する
An organization has the following password policies:
* Passwords must be at least 16 characters long.
* Three tailed login attempts will lock the account (or live minutes.
* Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol.
A database server was recently breached, and the incident response team suspects the passwords were compromised. Users with permission on that database server were forced to change their passwords for that server. Unauthorized and suspicious logins are now being detected on the same server. Which of the following is MOST likely the issue, and what should be done?
* Passwords must be at least 16 characters long.
* Three tailed login attempts will lock the account (or live minutes.
* Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol.
A database server was recently breached, and the incident response team suspects the passwords were compromised. Users with permission on that database server were forced to change their passwords for that server. Unauthorized and suspicious logins are now being detected on the same server. Which of the following is MOST likely the issue, and what should be done?
正解:D
解答を投票する
After successfully breaking into several networks and infecting multiple machines with malware. hackers contact the network owners, demanding payment to remove the infection and decrypt files. The hackers threaten to publicly release information about the breach if they are not paid. Which of the following BEST describes these attackers?
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A security consultant is analyzing data from a recent compromise. The following data points are documented: Access to data on share drives and certain networked hosts was lost after an employee logged in to an interactive session as a privileged user.
The data was unreadable by any known commercial software.
The issue spread through the enterprise via SMB only when certain users accessed dat a. Removal instructions were not available from any major antivirus vendor.
Which of the following types of malware is this an example of?
The data was unreadable by any known commercial software.
The issue spread through the enterprise via SMB only when certain users accessed dat a. Removal instructions were not available from any major antivirus vendor.
Which of the following types of malware is this an example of?
正解:E
解答を投票する
A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional dat a. Historically, this setup has worked without issue, but the researcher recently started getting the following message:

Which of the following network attacks Is the researcher MOST likely experiencing?

Which of the following network attacks Is the researcher MOST likely experiencing?
正解:B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A security analyst is determining the point of compromise after a company was hacked. The analyst checks the server logs and sees that a user account was logged in at night, and several large compressed files were exfiltrated. The analyst then discovers the user last logged in four years ago and was terminated. Which of the following should the security analyst recommend to prevent this type of attack in the future? (Choose two.)
正解:D、E
解答を投票する
A security analyst is performing a BIA.
The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use backup data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?
The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use backup data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?
正解:A
解答を投票する