Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-701 Practice Exam with Questions & Answers | Set: 9

Questions 121

A company is in the process of migrating to cloud-based services. The company's IT department has limited resources for migration and ongoing support. Which of the following best meets the company's needs?

Options:
A.

IPS

B.

WAF

C.

SASE

D.

IAM

CompTIA SY0-701 Premium Access
Questions 122

During a recent log review, an analyst discovers evidence of successful injection attacks. Which of the following will best address this issue?

Options:
A.

Authentication

B.

Secure cookies

C.

Static code analysis

D.

Input validation

Questions 123

A company installed cameras and added signs to alert visitors that they are being recorded. Which of the following controls did the company implement? (Select two).

Options:
A.

Directive

B.

Deterrent

C.

Preventive

D.

Detective

E.

Corrective

F.

Technical

Questions 124

A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?

Options:
A.

Insurance

B.

Patching

C.

Segmentation

D.

Replacement

Questions 125

Which of the following should a security team do first before a new web server goes live?

Options:
A.

Harden the virtual host.

B.

Create WAF rules.

C.

Enable network intrusion detection.

D.

Apply patch management

Questions 126

A company is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will most likely be classified? (Select two).

Options:
A.

Private

B.

Confidential

C.

Public

D.

Operational

E.

Urgent

F.

Restricted

Questions 127

Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?

Options:
A.

Destruction

B.

Certification

C.

Retention

D.

Sanitization

Questions 128

A company recently decided to allow employees to work remotely. The company wants to protect us data without using a VPN. Which of the following technologies should the company Implement?

Options:
A.

Secure web gateway

B.

Virtual private cloud end point

C.

Deep packet Inspection

D.

Next-gene ration firewall

Questions 129

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.

SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

Options:
A.

[Digital forensics

B.

E-discovery

C.

Incident response

D.

Threat hunting

Questions 130

Which of the following security control types does an acceptable use policy best represent?

Options:
A.

Detective

B.

Compensating

C.

Corrective

D.

Preventive

Questions 131

A company is utilizing an offshore team to help support the finance department. The company wants to keep the data secure by keeping it on a company device but does not want to provide equipment to the offshore team. Which of the following should the company implement to meet this requirement?

Options:
A.

VDI

B.

MDM

C.

VPN

D.

VPC

Questions 132

A systems administrator needs to encrypt all data on employee laptops. Which of the following encryption levels should be implemented?

Options:
A.

Volume

B.

Partition

C.

Full disk

D.

File

Questions 133

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

Options:
A.

Data in use

B.

Data in transit

C.

Geographic restrictions

D.

Data sovereignty

Questions 134

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Options:
A.

Secured zones

B.

Subject role

C.

Adaptive identity

D.

Threat scope reduction

Questions 135

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

Options:
A.

Public key infrastructure

B.

Open public ledger

C.

Public key encryption

D.

Key escrow