ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 21

Add to Whishlist

List of questions

Question 201

Report Export Collapse

Which of the following best describes configuring devices to log to an off-site location for possible future reference?

Become a Premium Member for full access
  Unlock Premium Member

Question 202

Report Export Collapse

Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 203

Report Export Collapse

A security analyst is reviewing the source code of an application in order to identify misconfigurations and vulnerabilities. Which of the following kinds of analysis best describes this review?

Become a Premium Member for full access
  Unlock Premium Member

Question 204

Report Export Collapse

A company most likely is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will be classified? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 205

Report Export Collapse

Which of the following would be used to detect an employee who is emailing a customer list to a personal account before leaving the company?

Become a Premium Member for full access
  Unlock Premium Member

Question 206

Report Export Collapse

An engineer moved to another team and is unable to access the new team's shared folders while still being able to access the shared folders from the former team. After opening a ticket, the engineer discovers that the account was never moved to the new group. Which of the following access controls is most likely causing the lack of access?

Become a Premium Member for full access
  Unlock Premium Member

Question 207

Report Export Collapse

A security engineer needs to configure an NGFW to minimize the impact of the increasing number of various traffic types during attacks. Which of the following types of rules is the engineer the most likely to configure?

Become a Premium Member for full access
  Unlock Premium Member

Question 208

Report Export Collapse

A security administrator identifies an application that is storing data using MD5. Which of the following best identifies the vulnerability likely present in the application?

Become a Premium Member for full access
  Unlock Premium Member

Question 209

Report Export Collapse

A company that is located in an area prone to hurricanes is developing a disaster recovery plan and looking at site considerations that allow the company to immediately continue operations. Which of the following is the best type of site for this company?

Become a Premium Member for full access
  Unlock Premium Member

Question 210

Report Export Collapse
Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions