CompTIA CY0-001認証試験に合格できない心配は要らない我々Japancertは一番信頼できるIT試験資料販売サイトになれるために、弊社はお客様に最完備かつ最新版のCY0-001問題集を提供して努力します。我々の問題集によって、ほとんどの受験生は大方の人から見る大変なCompTIA CY0-001試験にうまく合格しました。この成功データはCY0-001試験に準備する皆様にJapancertのCY0-001問題集を勧める根拠とします。もしあなたは残念的にCY0-001試験に失敗したら、全額で返金することを承諾します。すべてのことはあなたの安心的に試験に準備できるのためのです。 CompTIA SecAI+ Certification Exam 認定 CY0-001 試験問題 (Q82-Q87):質問 # 82
Which of the following attacks would be the best to automate with AI during dynamic application software testing (DAST)?
A. Threat modeling
B. Payload creation
C. Data poisoning
D. Distributed denial-of-service (DDoS)
正解:B
解説:
During DAST, automating the generation of diverse, targeted attack payloads lets testers probe runtime inputs (e.g., XSS, SQLi, command injection) more thoroughly and discover vulnerabilities that manual or static tests might miss.
質問 # 83
Which of the following is the primary purpose of validating data for an AI system?
A. To reduce consumption of resources
B. To automate the process
C. To optimize the storage databases
D. To ensure bias-free outcomes
正解:D
解説:
Validating data ensures quality, consistency, and fairness in training sets, helping prevent biased or inaccurate results in AI system outputs.
質問 # 84
Which of the following controls is the best way to mitigate a denial-of-service (DoS) attack?
A. Rate limiting
B. End-to-end encryption
C. Model guardrails
D. Access controls
正解:A
解説:
Rate limiting restricts the number of requests within a set timeframe, preventing attackers from overwhelming the system with excessive traffic, making it the best control to mitigate a DoS attack.
質問 # 85
A security administrator must provide access controls for AI systems to list tables. Which of the following should the administrator implement?
A. Data access
B. Agentic AI access
C. Network access control list (NACL)
D. Model access
正解:A
解説:
Since the requirement is to control which users or systems can list tables, the proper control lies at the data access level. Implementing data access controls ensures only authorized entities can view or query the underlying tables used by the AI system.
質問 # 86
Which of the following is most resistant to AI manipulation?
A. Antivirus
B. Payloads
C. Attack surface reduction
D. Application programming interface (API) gateway
E. AI-generated content
正解:C
解説:
Reducing the attack surface limits the number of potential entry points that attackers or manipulated AI inputs can exploit. This proactive security measure is more resistant to AI-driven manipulation than reactive controls like payload scanning or antivirus.