Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 53

Mary Smith

Mon, 24 Mar 2025

ComptiA Security+ Certification Exam Questions and answer - Part 53

1. A security administrator needs an external vendor to correct an urgent issue with an organization's physical access control system (PACS). The PACS does not currently have internet access because it is running a legacy operation system. Which of the following methods should the security administrator select the best balances security and efficiency?

A) Have the external vendor come onsite and provide access to the PACS directly
B) Set up VPN concentrator for the vendor and restrict access to the PACS using desktop sharing
C) Set up a web conference on the administrator's pc,then remotely connect to the pacs
D) Temporarily permit outbound internet access for the pacs so desktop sharing can be set up



2. A security technician has been receiving alerts from several servers that indicate load balancers have had a significant increase in traffic. The technician initiates a system scan. The scan results illustrate that the disk space on several servers has reached capacity. The scan also indicates that incoming internet traffic to the servers has increased. Which of the following is the MOST likely cause of the decreased disk space?

A) Authentication issues
B) Misconfigured devices
C) Unauthorized software
D) Logs and events anomalies



3. A security administrator wishes to implement a secure a method of file transfer when communicating with outside organizations. Which of the following protocols would BEST facilitate secure file transfers? (Select TWO)(Select 2answers)

A) FTP
B) SNMP
C) SMTP
D) FTPS
E) SCP
F) TFTP

4. A small company's Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company's security posture quickly with regard to targeted attacks. Which of the following should the CSO conduct FIRST?

A) Conduct an internal audit against industry best practices to perform a qualitative analysis.
B) Deploy a UTM solution that receives frequent updates from a trusted industry vendor.
C) Survey threat feeds from services inside the same industry.
D) Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic



5. A security administrator wants to implement a company-wide policy to empower data owners to manage and enforce access control rules on various resources. Which of the following should be implemented?

A) Rule-based access control
B) Role based access control
C) Mandatory access control
D) Discretionary access control



1. Right Answer: D
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: D,E
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment