Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Comptia Security Plus Domain 4 Ce 100% CORRECT SOLUTIONS GRADE A+

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
25-05-2024
Written in
2023/2024

Question In a medium-sized company, the IT department manages access to various systems and resources for employees. The team wants to enhance the security posture by implementing better access controls. They use rule-based access controls and time-of-day restrictions to achieve this goal. What are the IT department's objectives in implementing rule-based access controls and time-of-day restrictions? (Select the two best options.) A.To define specific access rules based on employees' roles and r A.To define specific access rules based on employees' roles and responsibilities D.To restrict access to critical systems during non-working hours to enhance security Question In a medium-sized organization, the IT department manages a wide range of applications employees use. Recently, the IT security team identified a growing number of security incidents related to malware infections and unauthorized access to sensitive data. They suspect that certain applications may be the entry point for these attacks. To mitigate the risks, the team wants to implement a security measure that isolates applications from the rest of the system to prevent potential threats A.Sandboxing Question A cyber group is reviewing its web filtering capabilities after a recent breach. Which centralized web-filtering technique groups websites into categories such as social networking, gambling, and webmail? A.Block rules B.Content categorization C.Reputation-based filtering D.URL scanning B.Content categorization A security administrator reviews the configuration of a newly implemented Security Information and Event Management (SIEM) system. The SIEM system collects and correlates data from various sources, such as network sensors, application logs, and host logs. The administrator notices that some network devices, like switches and routers, do not directly support the installed agents for data collection. What approach should the administrator consider to ensure the inclusion of these devices' logs i A.Configuring the devices to push log changes to the SIEM server using a listener/collector approach Question An organization wants to enhance its cybersecurity by implementing web filtering. The company needs a solution that provides granular control over web traffic, ensures policy enforcement even when employees are off the corporate network, and can log and analyze Internet usage patterns. Which of the following strategies BEST meets these requirements? A.Reputation-based filtering B.Centralized web filtering C.Manual URL blockingD.Agent-based filtering D.Agent-based filtering D.Agent-based filtering Question A financial institution is preparing to decommission a number of its old servers. The servers contain sensitive customer data that needs proper handling to prevent unauthorized access or data breaches. Which strategy should the institution primarily employ to ensure the data on these servers stays irretrievable? A.Use a basic method of overwriting, such as zero filling, once. B.Leave the data on the servers, as the system will eventually overwrite it. C.Carry out a sanitization process C.Carry out a sanitization process that includes multiple passes of overwriting and degaussing. Question The chief information officer (CIO) wants to expand the company's ability to accurately identify vulnerabilities across the company. The CIO wants to be able to scan client PCs, mobile devices, servers, routers, and switches. What type of scanner are they looking to institute? A.Network vulnerability scanner B.Package monitoring C.Credentialed scan D.Dynamic analysis A.Network vulnerability scanner Question A tech department reviews the current model for incident response procedures in response to a serious incident at the company. What part of the process should they focus on for a review of data to determine the legitimacy of a genuine incident? A.Analysis B.Containment C.Eradication D.Detection A Analysis D.Detection (Not) Question A company's network has experienced increased infiltration due to employees accessing dangerous websites from different content categories. The company has decided to enhance its security by implementing reputation-based filtering and content categorization in its web filtering system. Which of the following BEST compares these features? A.Reputation-based filtering sorts by content themes; content categorization rates by past behaviors. B.Reputation-based filtering permits executable C. Reputation-based filtering evaluates sites by past behavior; content categorization sorts by themes like adult content. Reputation-based filtering assesses websites based on their historical behavior and reputation, while content categorization categorizes websites into thematic categories such as adult content, social media, etc. This comparison accurately describes the primary focus and purpose of each of these features. A digital forensics analyst at a healthcare company is investigating a case involving a potential internal data breach. The breach has led to unauthorized access and potential exposure of sensitive patient information. The company uses a Security Information and Event Management (SIEM) tool that aggregates and correlates data from multiple sources. The analyst's task is to identify potential insider threats that could be responsible for the breach. Given the nature of the breach, which combinati D.(Correct)Investigate log files generated by the OS components of client and server host computers, logs generated by applications, services running on hosts, and endpoint logs. A hacker successfully bypasses several protections and exfiltrates sensitive data. The company immediately begins recovery and takes steps to discover the initial problem that allowed the infiltration. This type of investigation is commonly referred to as what? A.Lessons learned B.Analysis C.Recovery D.Root cause analysis CONTINUED......

Show more Read less
Institution
Course

Content preview

Comptia Security Plus Domain 4 Ce
100% CORRECT SOLUTIONS GRADE A+

Question
In a medium-sized company, the IT department manages access to
various systems and resources for employees. The team wants to
enhance the security posture by implementing better access controls.
They use rule-based access controls and time-of-day restrictions to
achieve this goal. What are the IT department's objectives in
implementing rule-based access controls and time-of-day restrictions?
(Select the two best options.)
A.To define specific access rules based on employees' roles and r
A.To define specific access rules based on employees' roles and
responsibilities
D.To restrict access to critical systems during non-working hours to
enhance security
Question
In a medium-sized organization, the IT department manages a wide
range of applications employees use. Recently, the IT security team
identified a growing number of security incidents related to malware
infections and unauthorized access to sensitive data. They suspect
that certain applications may be the entry point for these attacks.
To mitigate the risks, the team wants to implement a security measure
that isolates applications from the rest of the system to prevent
potential threats
A.Sandboxing
Question
A cyber group is reviewing its web filtering capabilities after a
recent breach. Which centralized web-filtering technique groups
websites into categories such as social networking, gambling, and
webmail?
A.Block rules
B.Content categorization
C.Reputation-based filtering
D.URL scanning
B.Content categorization
A security administrator reviews the configuration of a newly
implemented Security Information and Event Management (SIEM) system.
The SIEM system collects and correlates data from various sources,
such as network sensors, application logs, and host logs. The

,administrator notices that some network devices, like switches and
routers, do not directly support the installed agents for data
collection. What approach should the administrator consider to ensure
the inclusion of these devices' logs i
A.Configuring the devices to push log changes to the SIEM server
using a listener/collector approach
Question
An organization wants to enhance its cybersecurity by implementing
web filtering. The company needs a solution that provides granular
control over web traffic, ensures policy enforcement even when
employees are off the corporate network, and can log and analyze
Internet usage patterns. Which of the following strategies BEST meets
these requirements?
A.Reputation-based filtering
B.Centralized web filtering
C.Manual URL blockingD.Agent-based filtering
D.Agent-based filtering
D.Agent-based filtering
Question
A financial institution is preparing to decommission a number of its
old servers. The servers contain sensitive customer data that needs
proper handling to prevent unauthorized access or data breaches.
Which strategy should the institution primarily employ to ensure the
data on these servers stays irretrievable?
A.Use a basic method of overwriting, such as zero filling, once.
B.Leave the data on the servers, as the system will eventually
overwrite it.
C.Carry out a sanitization process
C.Carry out a sanitization process that includes multiple passes of
overwriting and degaussing.
Question
The chief information officer (CIO) wants to expand the company's
ability to accurately identify vulnerabilities across the company.
The CIO wants to be able to scan client PCs, mobile devices, servers,
routers, and switches. What type of scanner are they looking to
institute?
A.Network vulnerability scanner
B.Package monitoring
C.Credentialed scan
D.Dynamic analysis
A.Network vulnerability scanner
Question
A tech department reviews the current model for incident response
procedures in response to a serious incident at the company. What

, part of the process should they focus on for a review of data to
determine the legitimacy of a genuine incident?
A.Analysis
B.Containment
C.Eradication
D.Detection
A Analysis
D.Detection (Not)
Question
A company's network has experienced increased infiltration due to
employees accessing dangerous websites from different content
categories. The company has decided to enhance its security by
implementing reputation-based filtering and content categorization in
its web filtering system. Which of the following BEST compares these
features?
A.Reputation-based filtering sorts by content themes; content
categorization rates by past behaviors.
B.Reputation-based filtering permits executable
C. Reputation-based filtering evaluates sites by past behavior;
content categorization sorts by themes like adult content.
Reputation-based filtering assesses websites based on their
historical behavior and reputation, while content categorization
categorizes websites into thematic categories such as adult content,
social media, etc. This comparison accurately describes the primary
focus and purpose of each of these features.
A digital forensics analyst at a healthcare company is investigating
a case involving a potential internal data breach. The breach has led
to unauthorized access and potential exposure of sensitive patient
information. The company uses a Security Information and Event
Management (SIEM) tool that aggregates and correlates data from
multiple sources. The analyst's task is to identify potential insider
threats that could be responsible for the breach. Given the nature of
the breach, which combinati
D.(Correct)Investigate log files generated by the OS components of
client and server host computers, logs generated by applications,
services running on hosts, and endpoint logs.
A hacker successfully bypasses several protections and exfiltrates
sensitive data. The company immediately begins recovery and takes
steps to discover the initial problem that allowed the infiltration.
This type of investigation is commonly referred to as what?
A.Lessons learned
B.Analysis
C.Recovery
D.Root cause analysis

Written for

Course

Document information

Uploaded on
May 25, 2024
Number of pages
22
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$14.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
munyuabeatrice92

Get to know the seller

Seller avatar
munyuabeatrice92 K
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
2 year
Number of followers
1
Documents
347
Last sold
2 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions