ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

Data in use
Data in use
Data in transit
Data in transit
Geographic restrictions
Geographic restrictions
Data sovereignty
Data sovereignty
Suggested answer: B
Explanation:

Data in transit is data that is moving from one location to another, such as over a network or through the air. Data in transit is vulnerable to interception, modification, or theft by malicious actors.A VPN (virtual private network) is a technology that protects data in transit by creating a secure tunnel between two endpoints and encrypting the data that passes through it2.

asked 02/10/2024
Gishi Anurag
32 questions

Question 162

Report Export Collapse

The marketing department set up its own project management software without telling the appropriate departments. Which of the following describes this scenario?

Shadow IT
Shadow IT
Insider threat
Insider threat
Data exfiltration
Data exfiltration
Service disruption
Service disruption
Suggested answer: A
Explanation:

Shadow IT is the term used to describe the use of unauthorized or unapproved IT resources within an organization. The marketing department set up its own project management software without telling the appropriate departments, such as IT, security, or compliance.This could pose a risk to the organization's security posture, data integrity, and regulatory compliance1.

asked 02/10/2024
Mpho Ntshontsi
43 questions

Question 163

Report Export Collapse

An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?

Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53
Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
Suggested answer: D
Explanation:

A firewall ACL (access control list) is a set of rules that determines which traffic is allowed or denied by the firewall. The rules are processed in order, from top to bottom, until a match is found. The syntax of a firewall ACL rule is:

Access list <direction> <source address> <destination address>

To limit outbound DNS traffic originating from the internal network, the firewall ACL should allow only the device with the IP address 10.50.10.25 to send DNS requests to any destination on port 53, and deny all other outbound traffic on port 53. The correct firewall ACL is:

Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53

The first rule permits outbound traffic from the source address 10.50.10.25/32 (a single host) to any destination address (0.0.0.0/0) on port 53 (DNS).The second rule denies all other outbound traffic on port 532.

asked 02/10/2024
Deepak PSK
52 questions

Question 164

Report Export Collapse

An engineer is setting up a VDI environment for a factory location, and the business wants to deploy a low-cost solution to enable users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

Laptops
Laptops
Containers
Containers
Thin clients
Thin clients
Workstations
Workstations
Suggested answer: C
Explanation:

Thin clients are devices that rely on a server or a cloud service to perform most of the processing and storage tasks, while only providing a minimal interface for the user. Thin clients are low-cost solutions that can enable users on the shop floor to log in to the VDI (virtual desktop infrastructure) environment directly, without requiring a full-fledged computer or laptop.

asked 02/10/2024
RALPH KOH
32 questions

Question 165

Report Export Collapse

Which of the following is an administrative control that would be most effective to reduce the occurrence of malware execution?

Security awareness training
Security awareness training
Frequency of NIDS updates
Frequency of NIDS updates
Change control procedures
Change control procedures
EDR reporting cycle
EDR reporting cycle
Suggested answer: A
Explanation:

Security awareness training is an administrative control that educates users on the best practices and policies for protecting the organization's data and systems from various threats, such as malware, phishing, social engineering, etc. Security awareness training can reduce the occurrence of malware execution by increasing the users' ability to recognize and avoid malicious links, attachments, downloads, or websites.

asked 02/10/2024
Michele Lorengo
43 questions

Question 166

Report Export Collapse

A client demands at least 99.99% uptime from a service provider's hosted security services. Which of the following documents includes the information the service provider should return to the client?

MOA
MOA
SOW
SOW
MOU
MOU
SLA
SLA
Suggested answer: D
Explanation:

A service level agreement (SLA) is a document that defines the level of service expected by a customer from a service provider, indicating the metrics by which that service is measured, and the remedies or penalties, if any, should the agreed-upon levels not be achieved. An SLA can specify the minimum uptime or availability of a service, such as 99.99%, and the consequences for failing to meet that standard. A memorandum of agreement (MOA), a statement of work (SOW), and a memorandum of understanding (MOU) are other types of documents that can be used to establish a relationship between parties, but they do not typically include the details of service levels and performance metrics that an SLA does.

Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 16-17

asked 02/10/2024
Yosra Chabchoub
45 questions

Question 167

Report Export Collapse

A company is adding a clause to its AUP that states employees are not allowed to modify the operating system on mobile devices. Which of the following vulnerabilities is the organization addressing?

Cross-site scripting
Cross-site scripting
Buffer overflow
Buffer overflow
Jailbreaking
Jailbreaking
Side loading
Side loading
Suggested answer: C
Explanation:

Jailbreaking is the process of removing the restrictions imposed by the manufacturer or carrier on a mobile device, such as an iPhone or iPad. Jailbreaking allows users to install unauthorized applications, modify system settings, and access root privileges. However, jailbreaking also exposes the device to potential security risks, such as malware, spyware, unauthorized access, data loss, and voided warranty.Therefore, an organization may prohibit employees from jailbreaking their mobile devices to prevent these vulnerabilities and protect the corporate data and network.Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 10: Mobile Device Security, page 5072

asked 02/10/2024
Manuela Kays
39 questions

Question 168

Report Export Collapse

Which of the following practices would be best to prevent an insider from introducing malicious code into a company's development process?

Code scanning for vulnerabilities
Code scanning for vulnerabilities
Open-source component usage
Open-source component usage
Quality assurance testing
Quality assurance testing
Peer review and approval
Peer review and approval
Suggested answer: D
Explanation:

Peer review and approval is a practice that involves having other developers or experts review the code before it is deployed or released. Peer review and approval can help detect and prevent malicious code, errors, bugs, vulnerabilities, and poor quality in the development process. Peer review and approval can also enforce coding standards, best practices, and compliance requirements.Peer review and approval can be done manually or with the help of tools, such as code analysis, code review, and code signing.Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 11: Secure Application Development, page 5432

asked 02/10/2024
Mark Anthony Acorda
40 questions

Question 169

Report Export Collapse

A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?

Off-the-shelf software
Off-the-shelf software
Orchestration
Orchestration
Baseline
Baseline
Policy enforcement
Policy enforcement
Suggested answer: B
Explanation:

Orchestration is the process of automating multiple tasks across different systems and applications. It can help save time and reduce human error by executing predefined workflows and scripts.In this case, the systems administrator can use orchestration to create accounts for a large number of end users without having to manually enter their information and assign permissions.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 4571

asked 02/10/2024
Gregory Destrebecq
37 questions

Question 170

Report Export Collapse

After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?

Group Policy
Group Policy
Content filtering
Content filtering
Data loss prevention
Data loss prevention
Access control lists
Access control lists
Suggested answer: D
Explanation:

Access control lists (ACLs) are rules that specify which users or groups can access which resources on a file server. They can help restrict access to confidential data by granting or denying permissions based on the identity or role of the user.In this case, the administrator can use ACLs to quickly modify the access rights of the users and prevent them from accessing the data they are not authorized to see.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 3081

asked 02/10/2024
PHINIT LAORUNGRUANGDECH
52 questions
Total 517 questions
Go to page: of 52
Search

Related questions