ExamGecko
Home Home / CompTIA / SY0-701

CompTIA SY0-701 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











Which of the following describes the category of data that is most impacted when it is lost?

A.
Confidential
A.
Confidential
Answers
B.
Public
B.
Public
Answers
C.
Private
C.
Private
Answers
D.
Critical
D.
Critical
Answers
Suggested answer: D

Explanation:

The category of data that is most impacted when it is lost is 'Critical.' Critical data is essential to the organization's operations and often includes sensitive information such as financial records, proprietary business information, and vital operational data. The loss of critical data can severely disrupt business operations and have significant financial, legal, and reputational consequences.

Confidential: Refers to data that must be protected from unauthorized access to maintain privacy and security.

Public: Refers to data that is intended for public disclosure and whose loss does not have severe consequences.

Private: Typically refers to personal data that needs to be protected to ensure privacy.

Critical: Refers to data that is essential for the operation and survival of the organization, and its loss can have devastating impacts.

After performing an assessment, an analyst wants to provide a risk rating for the findings. Which of the following concepts should most likely be considered when calculating the ratings?

A.
Owners and thresholds
A.
Owners and thresholds
Answers
B.
Impact and likelihood
B.
Impact and likelihood
Answers
C.
Appetite and tolerance
C.
Appetite and tolerance
Answers
D.
Probability and exposure factor
D.
Probability and exposure factor
Answers
Suggested answer: B

Explanation:

When calculating risk ratings, the concepts of impact and likelihood are most likely to be considered. Risk assessment typically involves evaluating the potential impact of a threat (how severe the consequences would be if the threat materialized) and the likelihood of the threat occurring (how probable it is that the threat will occur).

Impact: Measures the severity of the consequences if a particular threat exploits a vulnerability. It considers factors such as financial loss, reputational damage, and operational disruption.

Likelihood: Measures the probability of a threat exploiting a vulnerability. This can be based on historical data, current threat landscape, and expert judgment.

Which of the following should a systems administrator set up to increase the resilience of an application by splitting the traffic between two identical sites?

A.
Load balancing
A.
Load balancing
Answers
B.
Geographic disruption
B.
Geographic disruption
Answers
C.
Failover
C.
Failover
Answers
D.
Parallel processing
D.
Parallel processing
Answers
Suggested answer: A

Explanation:

To increase the resilience of an application by splitting the traffic between two identical sites, a systems administrator should set up load balancing. Load balancing distributes network or application traffic across multiple servers or sites, ensuring no single server becomes overwhelmed and enhancing the availability and reliability of applications.

Load balancing: Distributes traffic across multiple servers to ensure high availability and reliability. It helps in managing the load efficiently and can prevent server overloads.

Geographic disruption: Not a standard term related to resilience. This might imply the use of geographically distributed sites but isn't the precise solution described.

Failover: Refers to switching to a standby server or system when the primary one fails. It doesn't inherently split traffic but rather takes over when a failure occurs.

Parallel processing: Refers to the simultaneous processing of tasks, not specifically related to load balancing web traffic.

During a recent breach, employee credentials were compromised when a service desk employee issued an MFA bypass code to an attacker who called and posed as an employee. Which of the following should be used to prevent this type of incident in the future?

A.
Hardware token MFA
A.
Hardware token MFA
Answers
B.
Biometrics
B.
Biometrics
Answers
C.
Identity proofing
C.
Identity proofing
Answers
D.
Least privilege
D.
Least privilege
Answers
Suggested answer: C

Explanation:

To prevent the issuance of an MFA bypass code to an attacker posing as an employee, implementing identity proofing would be most effective. Identity proofing involves verifying the identity of individuals before granting access or providing sensitive information.

Identity proofing: Ensures that the person requesting the MFA bypass is who they claim to be, thereby preventing social engineering attacks where attackers pose as legitimate employees.

Hardware token MFA: Provides an additional factor for authentication but does not address verifying the requester's identity.

Biometrics: Offers strong authentication based on physical characteristics but is not related to the process of issuing MFA bypass codes.

Least privilege: Limits access rights for users to the bare minimum necessary to perform their work but does not prevent social engineering attacks targeting the service desk.

A company hired a security manager from outside the organization to lead security operations. Which of the following actions should the security manager perform first in this new role?

A.
Establish a security baseline.
A.
Establish a security baseline.
Answers
B.
Review security policies.
B.
Review security policies.
Answers
C.
Adopt security benchmarks.
C.
Adopt security benchmarks.
Answers
D.
Perform a user ID revalidation.
D.
Perform a user ID revalidation.
Answers
Suggested answer: B

Explanation:

When a security manager is hired from outside the organization to lead security operations, the first action should be to review the existing security policies. Understanding the current security policies provides a foundation for identifying strengths, weaknesses, and areas that require improvement, ensuring that the security program aligns with the organization's goals and regulatory requirements.

Review security policies: Provides a comprehensive understanding of the existing security framework, helping the new manager to identify gaps and areas for enhancement.

Establish a security baseline: Important but should be based on a thorough understanding of existing policies and practices.

Adopt security benchmarks: Useful for setting standards, but reviewing current policies is a necessary precursor.

Perform a user ID revalidation: Important for ensuring user access is appropriate but not the first step in understanding overall security operations.

A company is decommissioning its physical servers and replacing them with an architecture that will reduce the number of individual operating systems. Which of the following strategies should the company use to achieve this security requirement?

A.
Microservices
A.
Microservices
Answers
B.
Containerization
B.
Containerization
Answers
C.
Virtualization
C.
Virtualization
Answers
D.
Infrastructure as code
D.
Infrastructure as code
Answers
Suggested answer: C

Explanation:


An organization wants to ensure the integrity of compiled binaries in the production environment. Which of the following security measures would best support this objective?

A.
Input validation
A.
Input validation
Answers
B.
Code signing
B.
Code signing
Answers
C.
SQL injection
C.
SQL injection
Answers
D.
Static analysis
D.
Static analysis
Answers
Suggested answer: B

Explanation:

To ensure the integrity of compiled binaries in the production environment, the best security measure is code signing. Code signing uses digital signatures to verify the authenticity and integrity of the software, ensuring that the code has not been tampered with or altered after it was signed.

Code signing: Involves signing code with a digital signature to verify its authenticity and integrity, ensuring the compiled binaries have not been altered.

Input validation: Ensures that only properly formatted data enters an application but does not verify the integrity of compiled binaries.

SQL injection: A type of attack, not a security measure.

Static analysis: Analyzes code for vulnerabilities and errors but does not ensure the integrity of compiled binaries in production.

A systems administrator would like to deploy a change to a production system. Which of the following must the administrator submit to demonstrate that the system can be restored to a working state in the event of a performance issue?

A.
Backout plan
A.
Backout plan
Answers
B.
Impact analysis
B.
Impact analysis
Answers
C.
Test procedure
C.
Test procedure
Answers
D.
Approval procedure
D.
Approval procedure
Answers
Suggested answer: A

Explanation:

To demonstrate that the system can be restored to a working state in the event of a performance issue after deploying a change, the systems administrator must submit a backout plan. A backout plan outlines the steps to revert the system to its previous state if the new deployment causes problems.

Backout plan: Provides detailed steps to revert changes and restore the system to its previous state in case of issues, ensuring minimal disruption and quick recovery.

Impact analysis: Evaluates the potential effects of a change but does not provide steps to revert changes.

Test procedure: Details the steps for testing the change but does not address restoring the system to a previous state.

Approval procedure: Involves obtaining permissions for the change but does not ensure system recovery in case of issues.

A security administrator is configuring fileshares. The administrator removed the default permissions and added permissions for only users who will need to access the fileshares as part of their job duties. Which of the following best describes why the administrator performed these actions?

A.
Encryption standard compliance
A.
Encryption standard compliance
Answers
B.
Data replication requirements
B.
Data replication requirements
Answers
C.
Least privilege
C.
Least privilege
Answers
D.
Access control monitoring
D.
Access control monitoring
Answers
Suggested answer: C

Explanation:

The security administrator's actions of removing default permissions and adding permissions only for users who need access as part of their job duties best describe the principle of least privilege. This principle ensures that users are granted the minimum necessary access to perform their job functions, reducing the risk of unauthorized access or data breaches.

Least privilege: Limits access rights for users to the bare minimum necessary for their job duties, enhancing security by reducing potential attack surfaces.

Encryption standard compliance: Involves meeting encryption requirements, but it does not explain the removal and assignment of specific permissions.

Data replication requirements: Focus on duplicating data across different systems for redundancy and availability, not related to user permissions.

Access control monitoring: Involves tracking and reviewing access to resources, but the scenario is about setting permissions, not monitoring them.

Which of the following describes effective change management procedures?

A.
Approving the change after a successful deployment
A.
Approving the change after a successful deployment
Answers
B.
Having a backout plan when a patch fails
B.
Having a backout plan when a patch fails
Answers
C.
Using a spreadsheet for tracking changes
C.
Using a spreadsheet for tracking changes
Answers
D.
Using an automatic change control bypass for security updates
D.
Using an automatic change control bypass for security updates
Answers
Suggested answer: B

Explanation:

Effective change management procedures include having a backout plan when a patch fails. A backout plan ensures that there are predefined steps to revert the system to its previous state if the new change or patch causes issues, thereby minimizing downtime and mitigating potential negative impacts.

Having a backout plan when a patch fails: Essential for ensuring that changes can be safely reverted in case of problems, maintaining system stability and availability.

Approving the change after a successful deployment: Changes should be approved before deployment, not after.

Using a spreadsheet for tracking changes: While useful for documentation, it is not a comprehensive change management procedure.

Using an automatic change control bypass for security updates: Bypassing change control can lead to unapproved and potentially disruptive changes.

Total 350 questions
Go to page: of 35