CompTIA SY0-601 Practice Test - Questions Answers, Page 50

List of questions
Question 491

An organization has hired a red team to simulate attacks on its security pos-ture, which Of following will the blue team do after detecting an IOC?
Question 492

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer's Pll?
Question 493

Which of the following best reduces the security risks introduced when running systems that have expired vendor support and lack an immediate replacement?
Question 494

Which of the following security concepts should an e-commerce organization apply for protection against erroneous purchases?
Question 495

A security analyst discovers that one of the web APIs is being abused by an unknown third party. Logs indicate that the third party is attempting to manipulate the parameters being passed to the API endpoint. Which of the following solutions would best help to protect against the attack?
Question 496

A company recently suffered a breach in which an attacker was able to access the internal mail servers and directly access several user inboxes. A large number of email messages were later posted online. Which of the following would bast prevent email contents from being released should another breach occur?
Question 497

An organization has expanded its operations by opening a remote office. The new office is fully furnished with office resources to support up to 50 employees working on any given day. Which of the following VPN solutions would best support the new office?
Question 498

A security analyst needs to implement security features across smartphones. laptops, and tablets.
Which of the following would be the most effective across heterogeneous platforms?
Question 499

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the most acceptable?
Question 500

A security analyst discovers that a company's username and password database were posted on an internet forum. The usernames and passwords are stored in plaintext. Which of the following would mitigate the damage done by this type of data exfiltration in the future?
Question