Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-701 Practice Exam with Questions & Answers | Set: 4

Questions 46

Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?

Options:
A.

Fines

B.

Audit findings

C.

Sanctions

D.

Reputation damage

CompTIA SY0-701 Premium Access
Questions 47

An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?

Options:
A.

Smishing

B.

Disinformation

C.

Impersonating

D.

Whaling

Questions 48

Which of the following techniques would identify whether data has been modified in transit?

Options:
A.

Hashing

B.

Tokenization

C.

Masking

D.

Encryption

Questions 49

An organization has learned that its data is being exchanged on the dark web. The CIO

has requested that you investigate and implement the most secure solution to protect employee accounts.

INSTRUCTIONS

Review the data to identify weak security practices and provide the most appropriate

security solution to meet the CIO's requirements.

SY0-701 Question 49

Options:
Questions 50

A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?

Options:
A.

Jump server

B.

RADIUS

C.

HSM

D.

Load balancer

Questions 51

An organization recently started hosting a new service that customers access through a web portal. A security engineer needs to add to the existing security devices a new solution to protect this new service. Which of the following is the engineer most likely to deploy?

Options:
A.

Layer 4 firewall

B.

NGFW

C.

WAF

D.

UTM

Questions 52

A penetration test identifies that an SMBvl Is enabled on multiple servers across an organization. The organization wants to remediate this vulnerability in the most efficient way possible. Which of the following should the organization use for this purpose?

Options:
A.

GPO

B.

ACL

C.

SFTP

D.

DLP

Questions 53

A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the file's creator. Which of the following actions would most likely give the security analyst the information required?

Options:
A.

Obtain the file's SHA-256 hash.

B.

Use hexdump on the file's contents.

C.

Check endpoint logs.

D.

Query the file's metadata.

Questions 54

One of a company's vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?

Options:
A.

Virtualization

B.

Firmware

C.

Application

D.

Operating system

Questions 55

While considering the organization's cloud-adoption strategy, the Chief Information Security Officer sets a goal to outsource patching of firmware, operating systems, and applications to the chosen cloud vendor. Which of the following best meets this goal?

Options:
A.

Community cloud

B.

PaaS

C.

Containerization

D.

Private cloud

E.

SaaS

F.

laaS

Questions 56

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

INSTRUCTIONS

Not all attacks and remediation actions will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

SY0-701 Question 56

Options:
Questions 57

Which of the following is a social engineering attack in which a bad actor impersonates a web URL?

Options:
A.

Pretexting

B.

Misinformation

C.

Typosquatting

D.

Watering-hole

Questions 58

An IT manager is increasing the security capabilities of an organization after a data classification initiative determined that sensitive data could be exfiltrated from the environment. Which of the following solutions would mitigate the risk?

Options:
A.

XDR

B.

SPF

C.

DLP

D.

DMARC

Questions 59

Which of the following can best protect against an employee inadvertently installing malware on a company system?

Options:
A.

Host-based firewall

B.

System isolation

C.

Least privilege

D.

Application allow list

Questions 60

Which of the following describes the process of concealing code or text inside a graphical image?

Options:
A.

Symmetric encryption

B.

Hashing

C.

Data masking

D.

Steganography