Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-701 Practice Exam with Questions & Answers | Set: 10

Questions 136

Which of the following describes the category of data that is most impacted when it is lost?

Options:
A.

Confidential

B.

Public

C.

Private

D.

Critical

CompTIA SY0-701 Premium Access
Questions 137

A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

Options:
A.

Testing input validation on the user input fields

B.

Performing code signing on company-developed software

C.

Performing static code analysis on the software

D.

Ensuring secure cookies are use

Questions 138

A network administrator wants to ensure that network traffic is highly secure while in transit. Which of the following actions best describes the actions the network administrator should take?

Options:
A.

Ensure that NAC is enforced on all network segments, and confirm that firewalls have updated policies to block unauthorized traffic.

B.

Ensure only TLS and other encrypted protocols are selected for use on the network, and only permit authorized traffic via secure protocols.

C.

Configure the perimeter IPS to block inbound HTTPS directory traversal traffic, and verify that signatures are updated on a daily basis.

D.

Ensure the EDR software monitors for unauthorized applications that could be used by threat actors, and configure alerts for the security team.

Questions 139

An organization is struggling with scaling issues on its VPN concentrator and internet circuit due to remote work. The organization is looking for a software solution that will allow it to reduce traffic on the VPN and internet circuit, while still providing encrypted tunnel access to the data center and monitoring of remote employee internet traffic. Which of the following will help achieve these objectives?

Options:
A.

Deploying a SASE solution to remote employees

B.

Building a load-balanced VPN solution with redundant internet

C.

Purchasing a low-cost SD-WAN solution for VPN traffic

D.

Using a cloud provider to create additional VPN concentrators

Questions 140

An employee in the accounting department receives an email containing a demand for payment tot services performed by a vendor However, the vendor is not in the vendor management database. Which of the following in this scenario an example of?

Options:
A.

Pretexting

B.

Impersonation

C.

Ransomware

D.

Invoice scam

Questions 141

An organization wants to donate its aging network hardware. Which of the following should the organization perform to prevent any network details from leaking?

Options:
A.

Destruction

B.

Sanitization

C.

Certification

D.

Data retention

Questions 142

A security analyst is reviewing the security of a SaaS application that the company intends to purchase. Which of the following documentations should the security analyst request from the SaaS application vendor?

Options:
A.

Service-level agreement

B.

Third-party audit

C.

Statement of work

D.

Data privacy agreement

Questions 143

Which of the following describes the maximum allowance of accepted risk?

Options:
A.

Risk indicator

B.

Risk level

C.

Risk score

D.

Risk threshold

Questions 144

Which of the following must be considered when designing a high-availability network? (Select two).

Options:
A.

Ease of recovery

B.

Ability to patch

C.

Physical isolation

D.

Responsiveness

E.

Attack surface

F.

Extensible authentication

Questions 145

A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?

Options:
A.

Air gap the system.

B.

Move the system to a different network segment.

C.

Create a change control request.

D.

Apply the patch to the system.

Questions 146

A security analyst reviews web server logs and sees the following entries:

16.22.48.102 -- 26/April/2023 22:00:04.33 GET "http://www.databaseInfo.com/index.html/* " 200

16.22.48.102 -- 26/April/2023 22:00:07.23 GET "http://www.databaseInfo.com/index.html/../ " 404

16.22.48.102 -- 26/April/2023 22:01:16.03 GET "http://www.databaseInfo.com/index.html/../images " 404

16.22.48.102 -- 26/April/2023 22:03:10.25 GET "http://www.databaseInfo.com/index.html/../passwords " 404

16.22.48.102 -- 26/April/2023 22:05:11.22 GET "http://www.databaseInfo.com/index.html/../storedSQLqueries " 404

Which of the following attacks is most likely being attempted?

Options:
A.

Denial of service

B.

Password spraying

C.

SQL injection

D.

Directory traversal

Questions 147

A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement. Which of the following reconnaissance types is the tester performing?

Options:
A.

Active

B.

Passive

C.

Defensive

D.

Offensive

Questions 148

A company implemented an MDM policy 10 mitigate risks after repealed instances of employees losing company-provided mobile phones. In several cases. The lost phones were used maliciously to perform social engineering attacks against other employees. Which of the following MDM features should be configured to best address this issue? (Select two).

Options:
A.

Screen locks

B.

Remote wipe

C.

Full device encryption

D.

Push notifications

E.

Application management

F.

Geolocation

Questions 149

Which of the following teams combines both offensive and defensive testing techniques to protect an organization's critical systems?

Options:
A.

Red

B.

Blue

C.

Purple

D.

Yellow

Questions 150

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?

Options:
A.

Capacity planning

B.

Redundancy

C.

Geographic dispersion

D.

Tablet exercise