CompTIA SY0-601 Practice Test - Questions Answers, Page 50
List of questions
Related questions
An organization has hired a red team to simulate attacks on its security pos-ture, which Of following will the blue team do after detecting an IOC?
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer's Pll?
Which of the following best reduces the security risks introduced when running systems that have expired vendor support and lack an immediate replacement?
Which of the following security concepts should an e-commerce organization apply for protection against erroneous purchases?
A security analyst discovers that one of the web APIs is being abused by an unknown third party. Logs indicate that the third party is attempting to manipulate the parameters being passed to the API endpoint. Which of the following solutions would best help to protect against the attack?
A company recently suffered a breach in which an attacker was able to access the internal mail servers and directly access several user inboxes. A large number of email messages were later posted online. Which of the following would bast prevent email contents from being released should another breach occur?
An organization has expanded its operations by opening a remote office. The new office is fully furnished with office resources to support up to 50 employees working on any given day. Which of the following VPN solutions would best support the new office?
A security analyst needs to implement security features across smartphones. laptops, and tablets.
Which of the following would be the most effective across heterogeneous platforms?
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the most acceptable?
A security analyst discovers that a company's username and password database were posted on an internet forum. The usernames and passwords are stored in plaintext. Which of the following would mitigate the damage done by this type of data exfiltration in the future?
Question