One of a company's vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?
A. Firmware
B. Application
C. Virtualization
D. Operating system
正解:A
質問 2:
A user enters a password to log in to a workstation and is then prompted to enter an authentication code Which of the following MFA factors or attributes are being utilized in the authentication process? {Select two).
A. Something you are
B. Someone you know
C. Something you have
D. Something you can do
E. Something you know
F. Somewhere you are
正解:C,E
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Which of the following environments utilizes a subset of customer data and is most likely to be used to assess the impacts of major system upgrades and demonstrate system features?
A. Development
B. Production
C. Staging
D. b Test
正解:C
質問 4:
Which of the following should customers who are involved with Ul developer agreements be concerned with when considering the use of these products on highly sensitive projects?
A. Unsecure user accounts
B. Integration activities
C. Weak configurations
D. Outsourced code development
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
A company recently decided to allow its employees to use their personally owned devices for tasks like checking email and messaging via mobile applications. The company would like to use MDM, but employees are concerned about the loss of personal dat a. Which of the following should the IT department implement to BEST protect the company against company data loss while still addressing the employees' concerns?
A. Perform a factory reset on the phone before installing the company's applications.
B. Enable the remote-wiping option in the MDM software in case the phone is stolen.
C. Configure MDM for FDE without enabling the lock screen.
D. Configure the MDM software to enforce the use of PINs to access the phone.
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Which of the following should a systems administrator use to ensure an easy deployment of resources within the cloud provider?
A. Infrastructure as code
B. Internet of Things
C. Software as a service
D. Software-defined networking
正解:A
質問 7:
After a web server was migrated to a cloud environment, user access to that server was blocked. Even though an on-premises firewall configuration has been modified to reflect the cloud infrastructure, users are still experiencing access issues. Which of the following most likely needs to be configured?
A. Storage permissions
B. URL filter
C. Resource allocation
D. Security group
E. Load balancer pool
正解:D
質問 8:
A corporate security team needs to secure the wireless perimeter of its physical facilities to ensure only authorized users can access corporate resources. Which of the following should the security team do? (Refer the answer from CompTIA SY0-601 Security+ documents or guide at comptia.org)
A. Check for channel overlaps.
B. Implement domain hijacking.
C. Identify rogue access points.
D. Create heat maps.
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
Maruyama -
初心者に優しい問題集になっており、無事、試験に合格することができました。本当に助かりました。誠に有難うございます