Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-701 Practice Exam with Questions & Answers | Set: 5

Questions 61

A bank set up a new server that contains customers' Pll. Which of the following should the bank use to make sure the sensitive data is not modified?

Options:
A.

Full disk encryption

B.

Network access control

C.

File integrity monitoring

D.

User behavior analytics

CompTIA SY0-701 Premium Access
Questions 62

An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?

Options:
A.

ACL

B.

DLP

C.

IDS

D.

IPS

Questions 63

Which of the following is the best reason to complete an audit in a banking environment?

Options:
A.

Regulatory requirement

B.

Organizational change

C.

Self-assessment requirement

D.

Service-level requirement

Questions 64

Which of the following describes a security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system?

Options:
A.

SIEM

B.

DLP

C.

IDS

D.

SNMP

Questions 65

A company wants to ensure secure remote access to its internal network. The company has only one public IP and would like to avoid making any changes to the current network setup. Which of the following solutions would best accomplish this goal?

Options:
A.

PAT

B.

IPSec VPN

C.

Perimeter network

D.

Reverse proxy

Questions 66

Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?

Options:
A.

Risk mitigation

B.

Risk identification

C.

Risk treatment

D.

Risk monitoring and review

Questions 67

Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company?

Options:
A.

Provisioning resources

B.

Disabling access

C.

Reviewing change approvals

D.

Escalating permission requests

Questions 68

Which of the following must be considered when designing a high-availability network? (Choose two).

Options:
A.

Ease of recovery

B.

Ability to patch

C.

Physical isolation

D.

Responsiveness

E.

Attack surface

F.

Extensible authentication

Questions 69

A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?

Options:
A.

Business email

B.

Social engineering

C.

Unsecured network

D.

Default credentials

Questions 70

A growing company would like to enhance the ability of its security operations center to detect threats but reduce the amount of manual work required tor the security analysts. Which of the following would best enable the reduction in manual work?

Options:
A.

SOAR

B.

SIEM

C.

MDM

D.

DLP

Questions 71

Which of the following architectures is most suitable to provide redundancy for critical business processes?

Options:
A.

Network-enabled

B.

Server-side

C.

Cloud-native

D.

Multitenant

Questions 72

An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas. The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?

Options:
A.

SSH

B.

SRTP

C.

S/MIME

D.

PPTP

Questions 73

A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline Which of the following should the analyst use?

Options:
A.

Intrusion prevention system

B.

Sandbox

C.

Endpoint detection and response

D.

Antivirus

Questions 74

Which of the following involves an attempt to take advantage of database misconfigurations?

Options:
A.

Buffer overflow

B.

SQL injection

C.

VM escape

D.

Memory injection

Questions 75

Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).

Options:
A.

The device has been moved from a production environment to a test environment.

B.

The device is configured to use cleartext passwords.

C.

The device is moved to an isolated segment on the enterprise network.

D.

The device is moved to a different location in the enterprise.

E.

The device's encryption level cannot meet organizational standards.

F.

The device is unable to receive authorized updates.