Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-701 Practice Exam with Questions & Answers | Set: 6

Questions 76

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

Options:
A.

Bluetooth

B.

Wired

C.

NFC

D.

SCADA

CompTIA SY0-701 Premium Access
Questions 77

A security analyst is prioritizing vulnerability scan results using a risk-based approach. Which of the following is the most efficient resource for the analyst to use?

Options:
A.

Business impact analysis

B.

Common Vulnerability Scoring System

C.

Risk register

D.

Exposure factor

Questions 78

Employees located off-site must have access to company resources in order to complete their assigned tasks These employees utilize a solution that allows remote access without interception concerns. Which of the following best describes this solution?

Options:
A.

Proxy server

B.

NGFW

C.

VPN

D.

Security zone

Questions 79

A website user is locked out of an account after clicking an email link and visiting a different website Web server logs show the user's password was changed, even though the user did not change the password. Which of the following is the most likely cause?

Options:
A.

Cross-sue request forgery

B.

Directory traversal

C.

ARP poisoning

D.

SQL injection

Questions 80

Which of the following are the best security controls for controlling on-premises access? (Select two.)

Options:
A.

Swipe card

B.

Picture ID

C.

Phone authentication application

D.

Biometric scanner

E.

Camera

F.

Memorable

Questions 81

A company plans to secure its systems by:

Preventing users from sending sensitive data over corporate email

Restricting access to potentially harmful websites

Which of the following features should the company set up? (Select two).

Options:
A.

DLP software

B.

DNS filtering

C.

File integrity monitoring

D.

Stateful firewall

Questions 82

Which of the following most accurately describes the order in which a security engineer should implement secure baselines?

Options:
A.

Deploy, maintain, establish

B.

Establish, maintain, deploy

C.

Establish, deploy, maintain

D.

Deploy, establish, maintain

Questions 83

Which of the following exercises should an organization use to improve its incident response process?

Options:
A.

Tabletop

B.

Replication

C.

Failover

D.

Recovery

Questions 84

Which of the following control types is AUP an example of?

Options:
A.

Physical

B.

Managerial

C.

Technical

D.

Operational

Questions 85

A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?

Options:
A.

Install endpoint protection

B.

Disable ports/protocols

C.

Change default passwords

D.

Remove unnecessary software

Questions 86

A user would like to install software and features that are not available with a smartphone's default software. Which of the following would allow the user to install unauthorized software and enable new features?

Options:
A.

SOU

B.

Cross-site scripting

C.

Jailbreaking

D.

Side loading

Questions 87

An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?

Options:
A.

Asset inventory

B.

Network enumeration

C.

Data certification

D.

Procurement process

Questions 88

A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?

Options:
A.

Off-the-shelf software

B.

Orchestration

C.

Baseline

D.

Policy enforcement

Questions 89

A security team created a document that details the order in which critical systems should be through back online after a major outage. Which of the following documents did the team create?

Options:
A.

Communication plan

B.

Incident response plan

C.

Data retention policy

D.

Disaster recovery plan

Questions 90

While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website. Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?

Options:
A.

Secure cookies

B.

Input sanitization

C.

Code signing

D.

Blocklist