CompTIA SY0-601 Practice Test - Questions Answers, Page 41
List of questions
Related questions
Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity Of a new vendor?
Which Of the following supplies non-repudiation during a forensics investiga-tion?
Which Of the following best ensures minimal downtime for organizations vÄh critical computing equipment located in earthquake-prone areas?
An audit identified Pll being utilized in the development environment of a crit-ical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed: however, the developers are concerned that without real data they cannot perform functionality tests and search for specific dat a. Which of the following should a security professional implement to best satisfy both the CPOs and the development team's requirements?
A company has installed badge readers for building access but is finding unau-thorized individuals roaming the hallways Of the following is the most likely cause?
An organization is repairing damage after an incident. Which Of the following controls is being implemented?
A research company discovered that an unauthorized piece of software has been detected on a small number of machines in its lab The researchers collaborate with other machines using port 445 and on the internet using port 443 The unau-thorized software is starting to be seen on additional machines outside of the lab and is making outbound communications using HTTPS and SMS. The security team has been instructed to resolve the issue as quickly as possible while causing minimal disruption to the researchers. Which of the following is the best course Of action in this scenario?
Which Of the following is a primary security concern for a setting up a BYOD program?
A security analyst is taking part in an evaluation process that analyzes and categorizes threat actors Of real-world events in order to improve the incident response team's process. Which Of the following is the analyst most likely participating in?
A company wants to build a new website to sell products online. The website wd I host a storefront application that allow visitors to add products to a shopping cart and pay for products using a credit card. which Of the following protocols •would be most secure to implement?
Question