ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO's report?

Become a Premium Member for full access
  Unlock Premium Member

Question 172

Report Export Collapse

A small business uses kiosks on the sales floor to display product information for customers. A security team discovers the kiosks use end-of-life operating systems. Which of the following is the security team most likely to document as a security implication of the current architecture?

Become a Premium Member for full access
  Unlock Premium Member

Question 173

Report Export Collapse

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

Become a Premium Member for full access
  Unlock Premium Member

Question 174

Report Export Collapse

Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 175

Report Export Collapse

An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system. Which of the following best describes the actions taken by the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 176

Report Export Collapse

Which of the following is the best reason to complete an audit in a banking environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 177

Report Export Collapse

Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 178

Report Export Collapse

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

Become a Premium Member for full access
  Unlock Premium Member

Question 179

Report Export Collapse

A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?

Become a Premium Member for full access
  Unlock Premium Member

Question 180

Report Export Collapse

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions