ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 24

Add to Whishlist

List of questions

Question 231

Report Export Collapse

Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 232

Report Export Collapse

Which of the following describes an executive team that is meeting in a board room and testing the company's incident response plan?

Become a Premium Member for full access
  Unlock Premium Member

Question 233

Report Export Collapse

Which of the following methods would most likely be used to identify legacy systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 234

Report Export Collapse

Which of the following considerations is the most important for an organization to evaluate as it establishes and maintains a data privacy program?

Become a Premium Member for full access
  Unlock Premium Member

Question 235

Report Export Collapse

Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?

Become a Premium Member for full access
  Unlock Premium Member

Question 236

Report Export Collapse

A user would like to install software and features that are not available with a smartphone's default software. Which of the following would allow the user to install unauthorized software and enable new features?

Become a Premium Member for full access
  Unlock Premium Member

Question 237

Report Export Collapse

A company is currently utilizing usernames and passwords, and it wants to integrate an MFA method that is seamless, can Integrate easily into a user's workflow, and can utilize employee-owned devices. Which of the following will meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 238

Report Export Collapse

A financial institution would like to store its customer data m the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 239

Report Export Collapse

The Chief Information Security Officer of an organization needs to ensure recovery from ransomware would likely occur within the organization's agreed-upon RPOs end RTOs. Which of the following backup scenarios would best ensure recovery?

Become a Premium Member for full access
  Unlock Premium Member

Question 240

Report Export Collapse

Which of the following best describe a penetration test that resembles an actual external attach?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions