PrepAway - Latest Free Exam Questions & Answers

Tag: Exam SY0-401 (update April 21th, 2017)

Exam SY0-401: CompTIA Security+ Certification (update April 21th, 2017)

Which of the following attack methodologies is the atta…

An attacker is attempting to exploit a zero-day vulnerability in a popular enterprise application. The attacker is using personalized information to target high-value
individuals in an attempt to obtain proprietary information from the organization. Which of the following attack methodologies is the attacker using?

Which of the following controls should be strengthened …

A major banking institution has been the victim of recurring, widespread fraud. The fraud has all occurred on the bank’s web portal. Recently, the bank implemented
a requirement for all users to obtain credentials in person at a physical office. However, this has not reduced the amount of fraud against legitimate customers.
Based on a review of the logs, most fraudulent transactions appear to be conducted with authentic credentials. Which of the following controls should be
strengthened to reduce the fraud through the website?

To best protect against unauthorized data sharing they …

Two companies are partnering to bid on a contract. Normally these companies are fierce competitors but for this procurement they have determined that a
partnership is the only way they can win the job. Each company is concerned about unauthorized data sharing and wants to ensure other divisions within each
company will not have access to proprietary data. To best protect against unauthorized data sharing they should each sign a(n):


Page 14 of 53« First...1213141516...203040...Last »