ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

An administrator discovers that some files on a database server were recently encrypted. The administrator sees from the security logs that the data was last accessed by a domain user. Which of the following best describes the type of attack that occurred?

Insider threat
Insider threat
Social engineering
Social engineering
Watering-hole
Watering-hole
Unauthorized attacker
Unauthorized attacker
Suggested answer: A
Explanation:

An insider threat is a type of attack that originates from someone who has legitimate access to an organization's network, systems, or data. In this case, the domain user who encrypted the files on the database server is an example of an insider threat, as they abused their access privileges to cause harm to the organization. Insider threats can be motivated by various factors, such as financial gain, revenge, espionage, or sabotage.

asked 02/10/2024
Ramzi Smair
40 questions

Question 112

Report Export Collapse

Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company?

Become a Premium Member for full access
  Unlock Premium Member

Question 113

Report Export Collapse

Which of the following must be considered when designing a high-availability network? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 114

Report Export Collapse

Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?

Become a Premium Member for full access
  Unlock Premium Member

Question 115

Report Export Collapse

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 116

Report Export Collapse

A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies.

Which of the following is the most important consideration during development?

Become a Premium Member for full access
  Unlock Premium Member

Question 117

Report Export Collapse

An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device. Which of the following best describes this kind of penetration test?

Become a Premium Member for full access
  Unlock Premium Member

Question 118

Report Export Collapse

A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 119

Report Export Collapse

Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?

Become a Premium Member for full access
  Unlock Premium Member

Question 120

Report Export Collapse

A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions