Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CompTIA SY0-701 Practice Exam with Questions & Answers | Set: 3

Questions 31

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated:

“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”

Which of the following are the best responses to this situation? (Choose two).

Options:
A.

Cancel current employee recognition gift cards.

B.

Add a smishing exercise to the annual company training.

C.

Issue a general email warning to the company.

D.

Have the CEO change phone numbers.

E.

Conduct a forensic investigation on the CEO's phone.

F.

Implement mobile device management.

CompTIA SY0-701 Premium Access
Questions 32

A security consultant needs secure, remote access to a client environment. Which of the following should the security consultant most likely use to gain access?

Options:
A.

EAP

B.

DHCP

C.

IPSec

D.

NAT

Questions 33

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

Options:
A.

VM escape

B.

SQL injection

C.

Buffer overflow

D.

Race condition

Questions 34

Which of the following would a security administrator use to comply with a secure baseline during a patch update?

Options:
A.

Information security policy

B.

Service-level expectations

C.

Standard operating procedure

D.

Test result report

Questions 35

Which of the following is a feature of a next-generation SIEM system?

Options:
A.

Virus signatures

B.

Automated response actions

C.

Security agent deployment

D.

Vulnerability scanning

Questions 36

Which of the following topics would most likely be included within an organization's SDLC?

Options:
A.

Service-level agreements

B.

Information security policy

C.

Penetration testing methodology

D.

Branch protection requirements

Questions 37

Which of the following is the best way to remove personal data from a social media account that is no longer being used?

Options:
A.

Exercise the right to be forgotten

B.

Uninstall the social media application

C.

Perform a factory reset

D.

Terminate the social media account

Questions 38

A cybersecurity incident response team at a large company receives notification that malware is present on several corporate desktops No known Indicators of compromise have been found on the network. Which of the following should the team do first to secure the environment?

Options:
A.

Contain the Impacted hosts

B.

Add the malware to the application blocklist.

C.

Segment the core database server.

D.

Implement firewall rules to block outbound beaconing

Questions 39

Which of the following should an internal auditor check for first when conducting an audit of the organization's risk management program?

Options:
A.

Policies and procedures

B.

Asset management

C.

Vulnerability assessment

D.

Business impact analysts

Questions 40

An administrator has configured a quarantine subnet for all guest devices that connect to the network. Which of the following would be best for the security team to configure on the MDM before allowing access to corporate resources?

Options:
A.

Device fingerprinting

B.

Compliance attestation

C.

NAC

D.

802.1X

Questions 41

A university employee logged on to the academic server and attempted to guess the system administrators' log-in credentials. Which of the following security measures should the university have implemented to detect the employee's attempts to gain access to the administrators' accounts?

Options:
A.

Two-factor authentication

B.

Firewall

C.

Intrusion prevention system

D.

User activity logs

Questions 42

A security team is setting up a new environment for hosting the organization's on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?

Options:
A.

Visualization and isolation of resources

B.

Network segmentation

C.

Data encryption

D.

Strong authentication policies

Questions 43

During a SQL update of a database, a temporary field used as part of the update sequence was modified by an attacker before the update completed in order to allow access to the system. Which of the following best describes this type of vulnerability?

Options:
A.

Race condition

B.

Memory injection

C.

Malicious update

D.

Side loading

Questions 44

Which of the following activities is the first stage in the incident response process?

Options:
A.

Detection

B.

Declaration

C.

Containment

D.

Vacation

Questions 45

A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?

Options:
A.

Wireless access point

B.

Switch

C.

Firewall

D.

NAC