Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-701 Practice Exam with Questions & Answers | Set: 11

Questions 151

Which of the following would best allow a company to prevent access to systems from the Internet?

Options:
A.

Containerization

B.

Virtualization

C.

SD-WAN

D.

Air-gapped

CompTIA SY0-701 Premium Access
Questions 152

Which of the following is die most important security concern when using legacy systems to provide production service?

Options:
A.

Instability

B.

Lack of vendor support

C.

Loss of availability

D.

Use of insecure protocols

Questions 153

Which of the following can be used to identify potential attacker activities without affecting production servers?

Options:
A.

Honey pot

B.

Video surveillance

C.

Zero Trust

D.

Geofencing

Questions 154

A company's website is www. Company. com Attackers purchased the domain wwww. company.com Which of the following types of attacks describes this example?

Options:
A.

Typosquatting

B.

Brand Impersonation

C.

On-path

D.

Watering-hole

Questions 155

A site reliability engineer is designing a recovery strategy that requires quick failover to an identical site if the primary facility goes down. Which of the following types of sites should the engineer consider?

Options:
A.

Recovery site

B.

Hot site

C.

Cold site

D.

Warm site

Questions 156

Which of the following agreement types defines the time frame in which a vendor needs to respond?

Options:
A.

SOW

B.

SLA

C.

MOA

D.

MOU

Questions 157

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

Options:
A.

SLA

B.

BPA

C.

NDA

D.

MOA

Questions 158

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company's reliance on open-source libraries?

Options:
A.

Buffer overflow

B.

SQL injection

C.

Cross-site scripting

D.

Zero day

Questions 159

Which of the following is the best way to provide secure remote access for employees while minimizing the exposure of a company's internal network?

Options:
A.

VPN

B.

LDAP

C.

FTP

D.

RADIUS

Questions 160

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?

Options:
A.

Order of volatility

B.

Preservation of event logs

C.

Chain of custody

D.

Compliance with legal hold

Questions 161

Which of the following risk management strategies should an enterprise adopt first if a legacy application is critical to business operations and there are preventative controls that are not yet implemented?

Options:
A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Questions 162

An organization recently updated its security policy to include the following statement:

Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and ? from variables set by forms in a web application.

Which of the following best explains the security technique the organization adopted by making this addition to the policy?

Options:
A.

Identify embedded keys

B.

Code debugging

C.

Input validation

D.

Static code analysis

Questions 163

A business received a small grant to migrate its infrastructure to an off-premises solution. Which of the following should be considered first?

Options:
A.

Security of cloud providers

B.

Cost of implementation

C.

Ability of engineers

D.

Security of architecture

Questions 164

A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?

Options:
A.

Audit each domain administrator account weekly for password compliance.

B.

Implement a privileged access management solution.

C.

Create IDS policies to monitor domain controller access.

D.

Use Group Policy to enforce password expiration.

Questions 165

An organization wants to improve the company's security authentication method for remote employees. Given the following requirements:

• Must work across SaaS and internal network applications

• Must be device manufacturer agnostic

• Must have offline capabilities

Which of the following would be the most appropriate authentication method?

Options:
A.

Username and password

B.

Biometrics

C.

SMS verification

D.

Time-based tokens