CompTIA SY0-701 Practice Test - Questions Answers, Page 12

List of questions
Question 111

An administrator discovers that some files on a database server were recently encrypted. The administrator sees from the security logs that the data was last accessed by a domain user. Which of the following best describes the type of attack that occurred?
An insider threat is a type of attack that originates from someone who has legitimate access to an organization's network, systems, or data. In this case, the domain user who encrypted the files on the database server is an example of an insider threat, as they abused their access privileges to cause harm to the organization. Insider threats can be motivated by various factors, such as financial gain, revenge, espionage, or sabotage.
Question 112

Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company?
Question 113

Which of the following must be considered when designing a high-availability network? (Select two).
Question 114

Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?
Question 115

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?
Question 116

A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies.
Which of the following is the most important consideration during development?
Question 117

An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device. Which of the following best describes this kind of penetration test?
Question 118

A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?
Question 119

Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?
Question 120

A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?
Question