CompTIA SY0-701 Practice Test - Questions Answers, Page 21
List of questions
Related questions
Which of the following best describes configuring devices to log to an off-site location for possible future reference?
Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?
A security analyst is reviewing the source code of an application in order to identify misconfigurations and vulnerabilities. Which of the following kinds of analysis best describes this review?
A company most likely is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will be classified? (Select two).
Which of the following would be used to detect an employee who is emailing a customer list to a personal account before leaving the company?
An engineer moved to another team and is unable to access the new team's shared folders while still being able to access the shared folders from the former team. After opening a ticket, the engineer discovers that the account was never moved to the new group. Which of the following access controls is most likely causing the lack of access?
A security engineer needs to configure an NGFW to minimize the impact of the increasing number of various traffic types during attacks. Which of the following types of rules is the engineer the most likely to configure?
A security administrator identifies an application that is storing data using MD5. Which of the following best identifies the vulnerability likely present in the application?
A company that is located in an area prone to hurricanes is developing a disaster recovery plan and looking at site considerations that allow the company to immediately continue operations. Which of the following is the best type of site for this company?
Question